Design and application of multiscroll chaotic attractors based on a novel multi-segmented memristor
J Zhang, J Zuo, M Wang, Y Guo, Q Xie, J Hou - Chaos, Solitons & Fractals, 2024 - Elsevier
Introducing memristors into the traditional chaotic system can generate multiscroll chaotic
attractors, expanding possibilities for information processing and chaotic applications. This …
attractors, expanding possibilities for information processing and chaotic applications. This …
Compact analog chaotic map designs using soi four-gate transistors
This work introduces three novel chaotic map circuits. Two of the map circuits use two-
channel and one-channel silicon-on-insulator (SOI) four-gate transistor (G 4 FET) while the …
channel and one-channel silicon-on-insulator (SOI) four-gate transistor (G 4 FET) while the …
A hardware-accelerated approach to chaotic image encryption: LTB Map and FPGA Implementation
The need for high-speed and secure image encryption has become increasingly critical in
the digital age, driven by the rapid growth of digital data, the rapid advancement of internet …
the digital age, driven by the rapid growth of digital data, the rapid advancement of internet …
FPGA-Based implementation and synchronization design of a new five-dimensional hyperchaotic system
Y Wang, X Li, X Li, Y Guang, Y Wu, Q Ding - Entropy, 2022 - mdpi.com
Considering the security of a communication system, designing a high-dimensional complex
chaotic system suitable for chaotic synchronization has become a key problem in chaotic …
chaotic system suitable for chaotic synchronization has become a key problem in chaotic …
Integrating Lorenz Hyperchaotic Encryption with Ring Oscillator Physically Unclonable Functions (RO-PUFs) for High-Throughput Internet of Things (IoT) Applications
A Magyari, Y Chen - Electronics, 2023 - mdpi.com
With the combined call for increased network throughput and security comes the need for
high-bandwidth, unconditionally secure systems. Through the combination of true random …
high-bandwidth, unconditionally secure systems. Through the combination of true random …
Characteristic analysis of 5D symmetric Hamiltonian conservative hyperchaotic system with hidden multiple stability
LL Huang, YH Ma, C Li - Chinese Physics B, 2024 - iopscience.iop.org
Conservative chaotic systems have unique advantages over dissipative chaotic systems in
the fields of secure communication and pseudo-random number generator because they do …
the fields of secure communication and pseudo-random number generator because they do …
Dynamical analysis of hyperbolic sinusoidal nonlinear multi-wing chaotic systems, synchronization methods and analog electronic circuit design
J Zhang, X Zhu - Journal of Circuits, Systems and Computers, 2023 - World Scientific
Chaotic systems contain nonlinear functions that have received much attention. This paper
introduces a new four-dimensional chaotic system with multi-winged attractors, containing …
introduces a new four-dimensional chaotic system with multi-winged attractors, containing …
Performance-Security Tradeoff of Multi-Dimensional Chaotic Maps for Resource-Constrained Environments
K Jain, V Vijayan, A Ajithkumar - 2024 8th International …, 2024 - ieeexplore.ieee.org
In today's interconnected world, resource-limited devices are crucial across various sectors
but face significant security challenges due to limited computational resources. Ensuring the …
but face significant security challenges due to limited computational resources. Ensuring the …
A new chaotic map derived from the Hermite–Kronecker–Brioschi characterization of the Bring-Jerrard quintic form
O Alpar - Physica Scripta, 2023 - iopscience.iop.org
Abstract The Bring-Jerrard normal form, achieved by Tschirnhaus transformation of a regular
quintic, is a reduced type of the general quintic equation with quartic, cubic and quadratic …
quintic, is a reduced type of the general quintic equation with quartic, cubic and quadratic …
Image encryption using a chaotic/hyperchaotic multidimensional discrete system
C Tanougast, B Bouteghrine, S Sadoudi… - Recent Advanced in …, 2023 - Springer
With the evolution of the communication technology, fast and efficient tools for secure
exchanged data are highly required in particular for image security. This chapter introduces …
exchanged data are highly required in particular for image security. This chapter introduces …