An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Wireless chaos-based communication systems: A comprehensive survey

G Kaddoum - IEEE Access, 2016 - ieeexplore.ieee.org
Since the early 1990s, a large number of chaos-based communication systems have been
proposed exploiting the properties of chaotic waveforms. The motivation lies in the …

A novel 3D chaotic system with line equilibrium: multistability, integral sliding mode control, electronic circuit, FPGA implementation and its image encryption

A Sambas, S Vaidyanathan, X Zhang, I Koyuncu… - IEEE …, 2022 - ieeexplore.ieee.org
This paper announces a novel three-dimensional chaotic system with line equilibrium and
discusses its dynamic properties such as Lyapunov exponents, phase portraits, equilibrium …

Secure image encryption algorithm design using a novel chaos based S-Box

Ü Çavuşoğlu, S Kaçar, I Pehlivan, A Zengin - Chaos, Solitons & Fractals, 2017 - Elsevier
In this study, an encryption algorithm that uses chaos based S-BOX is developed for secure
and speed image encryption. First of all, a new chaotic system is developed for creating S …

An efficient pixel-level chaotic image encryption algorithm

G Ye, C Pan, X Huang, Q Mei - Nonlinear Dynamics, 2018 - Springer
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In
contrast to the traditional permutation–diffusion architecture, the proposed method enhances …

A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system

Ü Çavuşoğlu, A Zengin, I Pehlivan, S Kaçar - Nonlinear dynamics, 2017 - Springer
Abstract Substitution Box (S-Box) is one of the most significant structures used to create an
encryption which is strong and resistant against attacks in block encryption algorithms. S …

A survey on true random number generators based on chaos

F Yu, L Li, Q Tang, S Cai, Y Song… - Discrete Dynamics in …, 2019 - Wiley Online Library
With the rapid development of communication technology and the popularization of network,
information security has been highly valued by all walks of life. Random numbers are used …

Chaos-based engineering applications with a 3D chaotic system without equilibrium points

A Akgul, H Calgan, I Koyuncu, I Pehlivan… - Nonlinear dynamics, 2016 - Springer
There has recently been an increase in the number of new chaotic system designs and
chaos-based engineering applications. In this study, since homoclinic and heteroclinic orbits …

A new four-scroll chaotic attractor and its engineering applications

A Akgul, I Moroz, I Pehlivan, S Vaidyanathan - Optik, 2016 - Elsevier
In this paper we investigate a new system of three coupled nonlinear ordinary differential
equations, whose dynamics support periodic and chaotic attractors as certain parameters …

Pseudorandom number generator based on a 5D hyperchaotic four-wing memristive system and its FPGA implementation

F Yu, L Li, B He, L Liu, S Qian, Z Zhang, H Shen… - The European Physical …, 2021 - Springer
Pseudorandom numbers are widely used in information encryption, spread spectrum
communication and other science and technology and engineering fields. Because chaos is …