Z Hua, Z Zhu, S Yi, Z Zhang, H Huang - Information Sciences, 2021 - Elsevier
Chaotic systems are suitable for image encryption owing to their numerous intrinsic characteristics. However, chaotic maps and algorithmic structures employed in many …
For many years dissipative quantum maps were widely used as informative models of quantum chaos. In this paper, a new scheme for generating good pseudo-random numbers …
In the last two decades, the use of chaotic iterative maps in cryptographic systems, especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
Y Wang, Z Liu, J Ma, H He - Nonlinear Dynamics, 2016 - Springer
In order to overcome the disadvantages of logistic map in designing chaos-based cipher, the piecewise logistic map (PLM) is presented. Some properties related to cryptography of the …
In recent years, a chaotic system is considered as an important pseudo-random source to pseudo-random number generators (PRNGs). This paper proposes a PRNG based on a …
Chaotic hash functions are a prospective branch of modern cryptography. Being compared with traditional hashing algorithms, an approach based on deterministic chaos allows …
The non-linear property of Chaos is a promising approach to information security, and many accomplishments have been made by combining Chaos with several sub-security domains …
Secure hash functions play a fundamental role in cryptographic and Web applications. They are mainly used, within digital signature schemes, to verify the integrity and authenticity of …
Y Li, G Ge - Multimedia Tools and Applications, 2019 - Springer
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash values), which can be used in a wide range of multimedia applications for communication …