[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[PDF][PDF] DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis

J Thakur, N Kumar - International journal of emerging technology and …, 2011 - academia.edu
Security is the most challenging aspects in the internet and network applications. Internet
and networks applications are growing very fast, so the importance and the value of the …

Semiconductor emitters in entropy sources for quantum random number generation

O Alkhazragi, H Lu, W Yan, N Almaymoni… - Annalen der …, 2023 - Wiley Online Library
Random number generation (RNG) is needed for a myriad of applications ranging from
secure communication encryption to numerical simulations to sports and games. However …

A novel perturbation method to reduce the dynamical degradation of digital chaotic maps

L Liu, H Xiang, X Li - Nonlinear Dynamics, 2021 - Springer
A chaotic map, which is realized on finite precision device, such as computer, will suffer
dynamical degradation. Such chaotic maps cannot be regarded as rigorous chaos anymore …

[PDF][PDF] A pseudo random bit generator based on chaotic logistic map and its statistical testing

V Patidar, KK Sud, NK Pareek - Informatica, 2009 - informatica.si
New rapid developments in the telecommunication technologies especially the Internet and
mobile networks have extended the domain of information transmission, which in turn …

[PDF][PDF] Statistical testing of random number generators

J Soto - Proceedings of the 22nd national information systems …, 1999 - Citeseer
Random Number Generators 1 (RNGs) are an important building block for algorithms and
protocols in cryptography. They are paramount in the construction of encryption keys and …

Experimental investigation on coverage performance of a chaotic autonomous mobile robot

CK Volos, IM Kyprianidis, IN Stouboulos - Robotics and Autonomous …, 2013 - Elsevier
In many autonomous mobile robotic missions the complete and fast coverage of the
workspace, scanned by an unpredictable trajectory, plays a crucial role. To satisfy these …

Pseudorandom bit generator based on non‐stationary logistic maps

L Liu, S Miao, H Hu, Y Deng - IET Information Security, 2016 - Wiley Online Library
Pseudorandom binary sequences play a significant role in many fields, such as error control
coding, spread spectrum communications, and cryptography. In recent years, chaotic system …

[图书][B] Randomness testing of the advanced encryption standard candidate algorithms

J Soto - 1999 - csrc.nist.gov
One of the criteria used to evaluate the Advanced Encryption Standard candidate algorithms
was their demonstrated suitability as random number generators. That is, the evaluation of …

Delay-introducing method to improve the dynamical degradation of a digital chaotic map

L Liu, S Miao - Information Sciences, 2017 - Elsevier
In this paper, a new delay-introducing method is proposed to improve the dynamical
degradation of a digital chaotic map. The delayed state is introduced to construct a function …