A review on applications of chaotic maps in pseudo-random number generators and encryption
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
A class of 2n+ 1 dimensional simplest Hamiltonian conservative chaotic systems and fast image encryption schemes
X Kong, F Yu, W Yao, C Xu, J Zhang, S Cai… - Applied Mathematical …, 2024 - Elsevier
Compared with dissipative systems, conservative systems do not have attractors, thus they
can better cope with the security risks brought by phase space reconstruction. In this paper …
can better cope with the security risks brought by phase space reconstruction. In this paper …
Pseudorandom number generator based on novel 2D Hénon-Sine hyperchaotic map with microcontroller implementation
D Murillo-Escobar, MÁ Murillo-Escobar… - Nonlinear …, 2023 - Springer
Recently, chaotic maps have been considered to design pseudorandom number generator
(PRNG). However, some chaotic maps present security disadvantages, such as low …
(PRNG). However, some chaotic maps present security disadvantages, such as low …
A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments
Future communication systems have become the most commonly categorized as Mobile Ad
hoc Networks and Vehicular Ad hoc Network (VANET). A VANET aims to protect vehicle …
hoc Networks and Vehicular Ad hoc Network (VANET). A VANET aims to protect vehicle …
An image encryption method based on multi-space confusion using hyperchaotic 2D Vincent map derived from optimization benchmark function
A novel multi-space confusion image encryption (MSC-IE) method based on 2D Vincent
map is presented in this study. In order to provide a more secure method, the MSC-IE …
map is presented in this study. In order to provide a more secure method, the MSC-IE …
Enhancing logistic chaotic map for improved cryptographic security in random number generation
M Alawida - Journal of Information Security and Applications, 2024 - Elsevier
The use of chaotic maps for cryptography is advantageous due to their desirable
characteristics, including complexity, unpredictability, sensitivity to initial values and control …
characteristics, including complexity, unpredictability, sensitivity to initial values and control …
Green computing for sustainable future technologies and its applications
S Ahmad, S Mishra, V Sharma - … Risks in Emerging Technology, Part A, 2023 - emerald.com
Purpose: Green computing is a way of using the computer resource in an eco-friendly while
maintaining and decreasing the harmful environmental impact. Minimising toxic materials …
maintaining and decreasing the harmful environmental impact. Minimising toxic materials …
Patient behaviour analysis and social health predictions through IoMT
In the age of ubiquitous computing, people around the globe are benefiting from a more
contemporary and intelligent way of living with the help of IoMT (Internet of Medical Things) …
contemporary and intelligent way of living with the help of IoMT (Internet of Medical Things) …
A pseudorandom number generator based on the chaotic map and quantum random walks
W Zhao, Z Chang, C Ma, Z Shen - Entropy, 2023 - mdpi.com
In this paper, a surjective mapping that satisfies the Li–Yorke chaos in the unit area is
constructed and a perturbation algorithm (disturbing its parameters and inputs through …
constructed and a perturbation algorithm (disturbing its parameters and inputs through …
Efficient multimodal biometric recognition for secure authentication based on deep learning approach
Biometric identification technology has become increasingly common in our daily lives as
the requirement for information protection and control legislation has grown around the …
the requirement for information protection and control legislation has grown around the …