Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A search for good pseudo-random number generators: Survey and empirical studies
This paper targets to search so-called good generators by doing a brief survey over the
generators developed in the history of pseudo-random number generators (PRNGs), verify …
generators developed in the history of pseudo-random number generators (PRNGs), verify …
Color image encryption based on hybrid hyper-chaotic system and cellular automata
This paper proposes an image encryption scheme based on Cellular Automata (CA). CA is a
self-organizing structure with a set of cells in which each cell is updated by certain rules that …
self-organizing structure with a set of cells in which each cell is updated by certain rules that …
Image encryption algorithm based on a new 3D chaotic system using cellular automata
Cryptography and steganography are usual methods for safe transfer of information, which
encryption algorithms turn original images into unreadable noise-like images. This paper …
encryption algorithms turn original images into unreadable noise-like images. This paper …
A novel hyperchaotic image encryption system based on particle swarm optimization algorithm and cellular automata
J Zeng, C Wang - Security and Communication Networks, 2021 - Wiley Online Library
In this paper, we propose a hyperchaotic image encryption system based on particle swarm
optimization algorithm (PSO) and cellular automata (CA). Firstly, to improve the ability to …
optimization algorithm (PSO) and cellular automata (CA). Firstly, to improve the ability to …
Investigation of strength and security of pseudo random number generators
Security is a key factor in today's fast communicating world. Many cryptographic algorithms
are tested and put into use efficiently. Random numbers are used in diverse forms like …
are tested and put into use efficiently. Random numbers are used in diverse forms like …
Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol
AS Khader, D Lai - 2015 22nd international conference on …, 2015 - ieeexplore.ieee.org
The acceleration in developments in communication technology has led to a consequent
increase in the vulnerability of data due to penetration attacks. These attacks often came …
increase in the vulnerability of data due to penetration attacks. These attacks often came …
Optimal design of residential cogeneration systems under uncertainty
This paper presents a multi-objective optimization method for designing cogeneration
systems in residential complexes and accounting for the involved uncertainty. The model …
systems in residential complexes and accounting for the involved uncertainty. The model …
Prevention of the man-in-the-middle attack on Diffie–Hellman key exchange algorithm: A review
In this report, we demonstrate the pros and cons of Diffie–Hellman key exchange algorithm
that is commonly used for the exchange of keys in private-key cryptosystem. A very …
that is commonly used for the exchange of keys in private-key cryptosystem. A very …
A derivative matrix-based covert communication method in blockchain
X Zhang, X Zhang, X Zhang, W Sun… - … Systems Science and …, 2023 - dr.ntu.edu.sg
The data in the blockchain cannot be tampered with and the users are anonymous, which
enables the blockchain to be a natural carrier for covert communication. However, the …
enables the blockchain to be a natural carrier for covert communication. However, the …
Cellular automata: Reversibility, semi-reversibility and randomness
K Bhattacharjee - arxiv preprint arxiv:1911.03609, 2019 - arxiv.org
In this dissertation, we study two of the global properties of 1-dimensional cellular automata
(CAs) under periodic boundary condition, namely, reversibility and randomness. To address …
(CAs) under periodic boundary condition, namely, reversibility and randomness. To address …