JS Teh, M Alawida, YC Sii - Journal of Information Security and Applications, 2020 - Elsevier
Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios …
G Alvarez, S Li - International journal of bifurcation and chaos, 2006 - World Scientific
In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many of the proposed schemes fail to explain or do not possess a …
D Arroyo, G Alvarez… - 2009 6th International Multi …, 2009 - ieeexplore.ieee.org
Chaotic cryptography is based on the properties of chaos as source of entropy. Many different schemes have been proposed to take advantage of those properties and to design …
CI Rincu, A Serbanescu - Bulletin of the Transilvania University of …, 2009 - webbut.unitbv.ro
The development of new information security systems based on chaos theory represents a new research field in the communication and information technology domain. Cryptography …
JM Amigó - Intelligent computing based on chaos, 2009 - Springer
Introduction The story of chaos-based or “chaotic” cryptography is remarkable, for several reasons. To begin with, it appeared outside conventional cryptography, first as an …
Chaotic cryptography describes the use of chaos theory (in particular physical dynamical systems working in chaotic regime as part of communication techniques and computation …
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, ie, chaos (nonlinear dynamic system) and cryptography (computer …
Chaos theory is considered as a tool for studying the systems that show divergence and disorder. After having used discrete mathematics to deduce non-convergence situations …
Introduction The idea of using chaotic transformations in cryptography is explicit in the foundational papers of Shannon on secrecy systems (eg,[96]). Although the word “chaos” …