Robust synchronization of uncertain unified chaotic systems subject to noise and its application to secure communication

CJ Cheng - Applied Mathematics and Computation, 2012 - Elsevier
Secure communication by the synchronization of coupled chaotic systems may be destroyed
by channel noise and inaccurate estimation of system parameters. This paper attempts to …

[PDF][PDF] Enhancement the Security of AES Against Modern Attacks by Using Variable Key Block Cipher.

S Sahmoud, W Elmasry, S Abudalfa - Int. Arab. J. e Technol., 2013 - academia.edu
In this paper ve developed a more powerful algorithm for cryptography. This algorithm is
based on AES to generate different suh kes from the original key and using each sub key to …

Consumer Friendly Energy Meter for Home Application

S Radhika, A Chandrasekar, S Jothi… - … on Advances in …, 2022 - ieeexplore.ieee.org
The power demand is increasing at an exponential rate every day, but the conventional
method for power generation, transmission and distribution does not meet the requirement …

Evolution of an emerging symmetric quantum cryptographic algorithm

OK Jasim, S Abbas, ESM Horbaty… - arXiv preprint arXiv …, 2015 - arxiv.org
With the rapid evolution of data exchange in network environments, information security has
been the most important process for data storage and communication. In order to provide …

An efficient algorithm for key generation in advance encryption standard using sudoku solving method

B Indrani, MK Veni - … on Inventive Systems and Control (ICISC), 2017 - ieeexplore.ieee.org
AES is one of the most secure and efficient symmetric cryptosystem for encryption process.
In AES, Rijndael Algorithm is used for key generation and expansion. The key size used in …

Innovative Method for enhancing Key generation and management in the AES-algorithm

OKJ Mohammad, S Abbas, ESM El-Horbaty… - arXiv preprint arXiv …, 2015 - arxiv.org
With the extraordinary maturity of data exchange in network environments and increasing
the attackers capabilities, information security has become the most important process for …

[PDF][PDF] Confidentiality technique for data stored in public cloud storage

SA Oli, L Arockiam - International Journal of Engineering Research …, 2016 - academia.edu
With the advancement of science and technology internet related communicative techniques
have taken prominent roles in everyday activities. However threat of hackers and malicious …

Advanced encryption standard development based quantum key distribution

OKJ Mohammad, S Abbas… - The 9th International …, 2014 - ieeexplore.ieee.org
This paper presents a development of the advanced encryption standard (AES) algorithm,
which is considered as the most important symmetric encryption algorithm. The development …

Quantum computing concepts with Deutsch Jozsa algorithm

P Aradyamath, NM Naghabhushana… - JOIV: International Journal …, 2019 - joiv.org
In this paper, we briefly review the basic concepts of quantum computation, Â entanglement,
 quantum cryptography and quantum fourier transform.   Quantum algorithms like …

Improve the Security of CGA using Adjustable Key Block Cipher based AES, to Prevent Attack on AES in IPV6 over MANET

KT Patil, ME Patil - 2014 IEEE Global Conference on Wireless …, 2014 - ieeexplore.ieee.org
The IPv6-enabled network architecture has recently attracted much attention due to a
security issue in MANET. Cryptographically Generated Addresses (CGAs) were used to …