An overview of encryption algorithms in color images

HM Ghadirli, A Nodehi, R Enayatifar - Signal Processing, 2019 - Elsevier
Nowadays, security in data transfer is of special importance. Images are of the most
attractive kinds of data in the encryption domain. Color images are more attractive than the …

[HTML][HTML] Cross-plane colour image encryption using a two-dimensional logistic tent modular map

Z Hua, Z Zhu, S Yi, Z Zhang, H Huang - Information Sciences, 2021 - Elsevier
Chaotic systems are suitable for image encryption owing to their numerous intrinsic
characteristics. However, chaotic maps and algorithmic structures employed in many …

Pseudo random number generator based on quantum chaotic map

A Akhshani, A Akhavan, A Mobaraki, SC Lim… - … in Nonlinear Science …, 2014 - Elsevier
For many years dissipative quantum maps were widely used as informative models of
quantum chaos. In this paper, a new scheme for generating good pseudo-random numbers …

Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map

P Ayubi, S Setayeshi, AM Rahmani - Chaos, Solitons & Fractals, 2023 - Elsevier
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …

A pseudorandom number generator based on piecewise logistic map

Y Wang, Z Liu, J Ma, H He - Nonlinear Dynamics, 2016 - Springer
In order to overcome the disadvantages of logistic map in designing chaos-based cipher, the
piecewise logistic map (PLM) is presented. Some properties related to cryptography of the …

Pseudo-random number generator based on logistic chaotic system

L Wang, H Cheng - Entropy, 2019 - mdpi.com
In recent years, a chaotic system is considered as an important pseudo-random source to
pseudo-random number generators (PRNGs). This paper proposes a PRNG based on a …

Construction of one-way hash functions with increased key space using adaptive chaotic maps

AV Tutueva, AI Karimov, L Moysis, C Volos… - Chaos, Solitons & …, 2020 - Elsevier
Chaotic hash functions are a prospective branch of modern cryptography. Being compared
with traditional hashing algorithms, an approach based on deterministic chaos allows …

[HTML][HTML] From Collatz Conjecture to chaos and hash function

M Rasool, SB Belhaouari - Chaos, Solitons & Fractals, 2023 - Elsevier
The non-linear property of Chaos is a promising approach to information security, and many
accomplishments have been made by combining Chaos with several sub-security domains …

Keyed hash function based on a chaotic map

A Kanso, H Yahyaoui, M Almulla - Information Sciences, 2012 - Elsevier
Secure hash functions play a fundamental role in cryptographic and Web applications. They
are mainly used, within digital signature schemes, to verify the integrity and authenticity of …

Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security

Y Li, G Ge - Multimedia Tools and Applications, 2019 - Springer
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash
values), which can be used in a wide range of multimedia applications for communication …