A novel pseudorandom number generator based on pseudorandomly enhanced logistic map

MA Murillo-Escobar, C Cruz-Hernández… - Nonlinear …, 2017 - Springer
In last years, low-dimensional and high-dimensional chaotic systems have been
implemented in cryptography. The efficiency and performance of these nonlinear systems …

Applied cryptography using chaos function for fast digital logic-based systems in ubiquitous computing

PK Shukla, A Khare, MA Rizvi, S Stalin, S Kumar - Entropy, 2015 - mdpi.com
Recently, chaotic dynamics-based data encryption techniques for wired and wireless
networks have become a topic of active research in computer science and network security …

Chaos-based bitwise dynamical pseudorandom number generator on FPGA

M Garcia-Bosque, A Pérez-Resa… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
In this paper, a new pseudorandom number generator (PRNG) based on the logistic map
has been proposed. To prevent the system to fall into short period orbits as well as …

Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map

N Nesa, T Ghosh, I Banerjee - Journal of Information Security and …, 2019 - Elsevier
This paper introduces a novel Logarithmic Chaotic Map (LCM) that is inspired by the well
known quadratic map. The chaotic dynamic of the proposed map LCM is thoroughly …

Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections

A Kadir, M Aili, M Sattar - Optik, 2017 - Elsevier
The paper proposes a color image encryption scheme based on coupled hyper chaotic
Lorenz systems. The novelty is to randomly inject impulse signals into coupled Lorenz …

A low power cryptography solution based on chaos theory in wireless sensor nodes

M Sharafi, F Fotouhi-Ghazvini, M Shirali… - IEEE …, 2019 - ieeexplore.ieee.org
Unobtrusive personal data collection by wearable sensors and ambient monitoring has
increased concerns about user privacy. Applying cryptography solutions to resource …

Secure lightweight cryptosystem for IoT and pervasive computing

M Abutaha, B Atawneh, L Hammouri, G Kaddoum - Scientific Reports, 2022 - nature.com
Large volumes of sensitive data are being transferred among devices as the Internet of
Things (IoT) grows in popularity. As a result, security measures must be implemented to …

A new modified Skew Tent Map and its application in pseudo-random number generator

T Umar, M Nadeem, F Anwer - Computer Standards & Interfaces, 2024 - Elsevier
Everyday, a vast amount of information is created and shared on the internet. Security steps
and methods are needed to ensure the data is sent and stored safely. Random numbers are …

An Experimental Realization of a Chaos‐Based Secure Communication Using Arduino Microcontrollers

M Zapateiro De la Hoz, L Acho… - The Scientific World …, 2015 - Wiley Online Library
Security and secrecy are some of the important concerns in the communications world. In
the last years, several encryption techniques have been proposed in order to improve the …

[PDF][PDF] A speech encryption based on chaotic maps

SN Al Saad, E Hato - International Journal of Computer Applications, 2014 - Citeseer
In this paper a new speech encryption system is presented. It is based on permutation and
substitution of speech samples using secret keys in time and transform domains. The system …