[图书][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[PDF][PDF] DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis
Security is the most challenging aspects in the internet and network applications. Internet
and networks applications are growing very fast, so the importance and the value of the …
and networks applications are growing very fast, so the importance and the value of the …
Semiconductor emitters in entropy sources for quantum random number generation
Random number generation (RNG) is needed for a myriad of applications ranging from
secure communication encryption to numerical simulations to sports and games. However …
secure communication encryption to numerical simulations to sports and games. However …
A novel perturbation method to reduce the dynamical degradation of digital chaotic maps
L Liu, H Xiang, X Li - Nonlinear Dynamics, 2021 - Springer
A chaotic map, which is realized on finite precision device, such as computer, will suffer
dynamical degradation. Such chaotic maps cannot be regarded as rigorous chaos anymore …
dynamical degradation. Such chaotic maps cannot be regarded as rigorous chaos anymore …
[PDF][PDF] A pseudo random bit generator based on chaotic logistic map and its statistical testing
New rapid developments in the telecommunication technologies especially the Internet and
mobile networks have extended the domain of information transmission, which in turn …
mobile networks have extended the domain of information transmission, which in turn …
[PDF][PDF] Statistical testing of random number generators
J Soto - Proceedings of the 22nd national information systems …, 1999 - Citeseer
Random Number Generators 1 (RNGs) are an important building block for algorithms and
protocols in cryptography. They are paramount in the construction of encryption keys and …
protocols in cryptography. They are paramount in the construction of encryption keys and …
Experimental investigation on coverage performance of a chaotic autonomous mobile robot
In many autonomous mobile robotic missions the complete and fast coverage of the
workspace, scanned by an unpredictable trajectory, plays a crucial role. To satisfy these …
workspace, scanned by an unpredictable trajectory, plays a crucial role. To satisfy these …
Pseudorandom bit generator based on non‐stationary logistic maps
L Liu, S Miao, H Hu, Y Deng - IET Information Security, 2016 - Wiley Online Library
Pseudorandom binary sequences play a significant role in many fields, such as error control
coding, spread spectrum communications, and cryptography. In recent years, chaotic system …
coding, spread spectrum communications, and cryptography. In recent years, chaotic system …
[图书][B] Randomness testing of the advanced encryption standard candidate algorithms
J Soto - 1999 - csrc.nist.gov
One of the criteria used to evaluate the Advanced Encryption Standard candidate algorithms
was their demonstrated suitability as random number generators. That is, the evaluation of …
was their demonstrated suitability as random number generators. That is, the evaluation of …
Delay-introducing method to improve the dynamical degradation of a digital chaotic map
L Liu, S Miao - Information Sciences, 2017 - Elsevier
In this paper, a new delay-introducing method is proposed to improve the dynamical
degradation of a digital chaotic map. The delayed state is introduced to construct a function …
degradation of a digital chaotic map. The delayed state is introduced to construct a function …