[HTML][HTML] A review on applications of chaotic maps in pseudo-random number generators and encryption

RB Naik, U Singh - Annals of Data Science, 2024 - Springer
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …

[HTML][HTML] Pseudorandom number generator based on novel 2D Hénon-Sine hyperchaotic map with microcontroller implementation

D Murillo-Escobar, MÁ Murillo-Escobar… - Nonlinear …, 2023 - Springer
Recently, chaotic maps have been considered to design pseudorandom number generator
(PRNG). However, some chaotic maps present security disadvantages, such as low …

Secure and fast image encryption algorithm using hyper-chaos-based key generator and vector operation

B Ge, X Chen, G Chen, Z Shen - IEEE Access, 2021 - ieeexplore.ieee.org
To protect image data privacy, a secure and fast image encryption algorithm using hyper-
chaos based key generator and vector operation is proposed. Firstly, we introduce a novel …

A new 5-D multistable hyperchaotic system with three positive Lyapunov exponents: Bifurcation analysis, circuit design, FPGA realization and image encryption

K Benkouider, S Vaidyanathan, A Sambas… - IEEE …, 2022 - ieeexplore.ieee.org
In this work, we describe the model of a new 5-D hyperchaotic system with three positive
Lyapunov exponents. Since the maximum positive Lyapunov exponent of the proposed …

A Peripheral-Free True Random Number Generator Based on Integrated Circuits Enabled by Atomically Thin Two-Dimensional Materials

H Ravichandran, D Sen, A Wali, TF Schranghamer… - ACS …, 2023 - ACS Publications
A true random number generator (TRNG) is essential to ensure information security for
Internet of Things (IoT) edge devices. While pseudorandom number generators (PRNGs) …

Real-time medical data security solution for smart healthcare

P Sarosh, SA Parah, BA Malik, M Hijji… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Cyberattacks pose a serious threat to the wireless transfer of sensitive healthcare data,
hampering the level of privacy offered. Numerous cyber-security modules have been …

Adaptive image encryption based on twin chaotic maps

M Lyle, P Sarosh, SA Parah - Multimedia Tools and Applications, 2022 - Springer
The information stored or shared via the internet is growing massively and includes images
primarily. The images are vulnerable to attacks when transferred over the internet as they …

An efficient and reliable chaos-based iot security core for udp/ip wireless communication

B Ilyas, SM Raouf, S Abdelkader, T Camel… - IEEE …, 2022 - ieeexplore.ieee.org
The ultimate focus of this paper is to provide a hyperchaos-based reconfigurable platform for
the real-time securing of communicating embedded systems interconnected in networks …

Automated chaos-driven S-box generation and analysis tool for enhanced cryptographic resilience

Y Aydın, F Özkaynak - IEEE Access, 2023 - ieeexplore.ieee.org
In a rapidly advancing world of technology, information security studies have become the
backbone of the digital age, and steps in this area are critical. In this context, cryptography …

Image encryption using combination of 4D discrete hyperchaotic map and DNA encoding

UK Gera, S Agrawal - Multimedia Tools and Applications, 2024 - Springer
A novel image encryption algorithm using a combination of 4D discrete hyperchaotic map
and DNA encoding is proposed in this work. The used 4D discrete hyperchaotic map has a …