Applied cryptography using chaos function for fast digital logic-based systems in ubiquitous computing

PK Shukla, A Khare, MA Rizvi, S Stalin, S Kumar - Entropy, 2015 - mdpi.com
Recently, chaotic dynamics-based data encryption techniques for wired and wireless
networks have become a topic of active research in computer science and network security …

[PDF][PDF] Statistical analysis of S-box in image encryption applications based on majority logic criterion

T Shah, I Hussain, MA Gondal, H Mahmood - Int. J. Phys. Sci, 2011 - academicjournals.org
The S-box is used in various block ciphers and the complexity of encryption essentially
depends on the strength of S-box. The strength of an S-box can be measured by analyzing …

[PDF][PDF] 3D chaotic functions for image encryption

PN Khade, M Narnaware - International journal of computer science issues …, 2012 - Citeseer
This paper proposes the chaotic encryption algorithm based on 3D logistic map, 3D
Chebyshev map, and 3D, 2D Arnolds cat map for color image encryption. Here the 2D …

Analysis of S-box image encryption based on generalized fuzzy soft expert set

S Abdullah, NU Amin - Nonlinear Dynamics, 2015 - Springer
This article is about a criterion based on generalized fuzzy soft expert set to scrutinize the
prevailing substitution boxes and learn their properties to sort out their suitability in image …

A novel statistical analysis of chaotic S-box in image encryption

M Khan, T Shah - 3D Research, 2014 - Springer
The S-box is utilized within different block ciphers and the complexity of encryption basically
relies on the quality of S-box. The quality of S-box could be measured by breaking down its …

Analyses of S-boxes based on interval valued intuitionistic fuzzy sets and image encryption

S Abdullah, S Ayub, I Hussain, B Bedregal… - International Journal of …, 2017 - Springer
Decision making implies selection of the best decision from a set of possible options. In
some cases, this selection is based on past experience. Past experience is used to analyse …

A novel security analysis for a new ntru variant with additional private key

N Salleh, H Kamarulhaili… - International Journal of …, 2023 - growingscience.com
This paper proposes a new variant of NTRU with a slightly different critical formulation. The
significance of this new variant is that it requires an additional private key to provide a tighter …

[PDF][PDF] Secure and fast chaos based encryption system using digital logic circuit

AA Khare, PB Shukla, SC Silakari - International Journal of …, 2014 - researchgate.net
DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR FINDING FREQUENT
SEQUENTIAL TRAVERSAL PATTERNS FROM WEB LOGS BASED ON WEIGHT CONST Page …

Chaotic chebyshev polynomials based remote user authentication scheme in client-server environment

TT Truong, MT Tran, AD Duong, I Echizen - ICT Systems Security and …, 2015 - Springer
Perfect forward secrecy is considered as the most important standard to evaluate a strong
authentication scheme. There are many results researched to achieve this property without …

[PDF][PDF] Parameter Selection in Public Key Cryptosystem based on Chebyshev Polynomials over Finite Field.

Z Li, Y Cui, Y Jin, H Xu - J. Commun., 2011 - researchgate.net
A recently proposed public key cryptosystem based on Chebyshev polynomials suggests a
new approach to data encryption. But the security of the cryptosystem has not been …