• No results found

[PDF] Top 20 A New Cipher Based on Feistel Structure and Chaotic Maps

Has 10000 "A New Cipher Based on Feistel Structure and Chaotic Maps" found on our website. Below are the top 20 most common "A New Cipher Based on Feistel Structure and Chaotic Maps".

A New Cipher Based on Feistel Structure and Chaotic Maps

A New Cipher Based on Feistel Structure and Chaotic Maps

... the feistel cipher, like DES, instead of using the entire enciphering keys at single round, a round-dependent key asubkey is taken from the enciphering ...a feistel cipher is designing of ... See full document

11

A Novel Block Cipher Algorithm with Feistel-Like Structure

A Novel Block Cipher Algorithm with Feistel-Like Structure

... a new block cipher algorithm with provable security is ...whole structure of the algorithm is novel and has a good encryption and decryption ...The structure of the proposed algorithm consists ... See full document

14

A Text Encryption Algorithm Based on Self-Synchronizing Stream Cipher and Chaotic Maps Dr. Ekhlas Abbas Albahrani, Tayseer Karam Alshekly

A Text Encryption Algorithm Based on Self-Synchronizing Stream Cipher and Chaotic Maps Dr. Ekhlas Abbas Albahrani, Tayseer Karam Alshekly

... logistic maps with different keys and a Tinker bell 2-D map. The chaotic sequence generated a mixed sequence from A and B of the Tinker bell map, depending on the chaotic sequences of the two ... See full document

7

Chaotic Maps for Key Generation in Block Cipher          for Multimedia Encryption/Decryption

Chaotic Maps for Key Generation in Block Cipher for Multimedia Encryption/Decryption

... increasingly based on chaotic systems, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are ...a new image encryption scheme which employs one of ... See full document

5

New chaotic planar attractors from smooth zero entropy interval maps

New chaotic planar attractors from smooth zero entropy interval maps

... is based on a careful selection of weakly unimodal ...such maps may have positive entropy, and therefore may generate indecomposable subcontinua of their inverse limit spaces, there is a class of zero ... See full document

11

R

R

... (PRBG) based on two chaotic logistic maps running side-by-side and starting from random independent initial ...of new stream ciphers ... See full document

5

Chaotic stream cipher-based secure data communications over intelligent transportation network

Chaotic stream cipher-based secure data communications over intelligent transportation network

... of chaotic secure communication has opened up a new approach to information secure ...a chaotic coupling signal or modulation of the parameters of the drive system by a digital message signal ...for ... See full document

33

An efficient chaos-based chaotic maps using block encryption ciphers method

An efficient chaos-based chaotic maps using block encryption ciphers method

... types: chaotic stream cryptosystems and chaotic block ...In chaotic stream cryptosystems, a key stream is produced by a chaotic map, which is used to encrypt a plaintext bit by ...A ... See full document

5

IMAGE ENCRYPTION USING CHAOTIC MAPS

IMAGE ENCRYPTION USING CHAOTIC MAPS

... techniques based on chaos theory reveal some new and effective directions to develop secure image encryption ...is based on key stream generator for confusion ...the cipher more dynamic ... See full document

6

New Text Encryption Algorithm Based on Block Cipher and Chaotic Maps

New Text Encryption Algorithm Based on Block Cipher and Chaotic Maps

... (0, 0) location remains unaltered. Keeping in mind the end goal to maintain a strategic distance from it, [11] a strategy to stay away from this shortcoming, the pixels position at the corners (0, 0), (N- 1, 0) , (N- 1,N ... See full document

7

Chaotic dynamics in flows and discrete maps

Chaotic dynamics in flows and discrete maps

... It Is now convenient to view the notion on a 2-D Poincare map P defined by P:R? ♦ R^, r 2 - {x, x | t - 0, 2*/u, 4i/u, •••}• As f Is Increased further, the stable and unstable manifolds of p, viewed on P, eventually ... See full document

155

Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps

Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps

... 10] based on chaotic-maps theory (nonlinear dynamic) have been studied widely because the operations of chaotic-maps use recurrence ...a new identity feature based on the ... See full document

6

REMOVING IPV6 SECURITY USING HYBRID ALGORITHM

REMOVING IPV6 SECURITY USING HYBRID ALGORITHM

... Abstract— The default method for IPv6 address generation use an organizationally Unique Identifier(OUI) assigned by the IEEE Standards Association and an Extension Identifier assigned by the hardware manufacturer. For ... See full document

6

Design of Identity-Based Blind Signature Scheme Upon Chaotic Maps

Design of Identity-Based Blind Signature Scheme Upon Chaotic Maps

... on chaotic maps have been presented ...and chaotic frameworks, the concept of chaotic systems with applications to cryptography has earned much consideration from scientists working in the ... See full document

15

A Novel Block Cipher Involving a Key Bunch Matrix

A Novel Block Cipher Involving a Key Bunch Matrix

... Fiestal Cipher involving Modular Arithmetic and a Key on both sides of the Plaintext Matrix”, International Journal of Computational Intelligence and Information Security (IJCIIS), Special Issue, ... See full document

6

Designing of Hybrid RSA Encryption Algorithm for Cloud Security

Designing of Hybrid RSA Encryption Algorithm for Cloud Security

... A plaintext block of X length bits and a key K are considered as inputs of Feistel encryption algorithm [15]. The plaintext data is divided into two halves (X/2), and data is passed through n numbers of rounds of ... See full document

7

Wireless Sensors Lightweight Encryption Project Implementation and Application

Wireless Sensors Lightweight Encryption Project Implementation and Application

... algorithm based on integer chaos to encrypt information, and improves the security and computing speed, reduce the power consumption, effectively improve the performance of the security of wireless sensor network, ... See full document

6

eLoBa Chaotic Keystream Cipher: Implementation, Analysis and Performance

eLoBa Chaotic Keystream Cipher: Implementation, Analysis and Performance

... Because the analytical solution of Lorenz differential equations is unknown, we follow a probabilistic strategy for the identification of eLoBa keystream output cycle length. Starting from one specific state, the ... See full document

6

Chaotic stream cipher-based secure data communications over intelligent transportation network

Chaotic stream cipher-based secure data communications over intelligent transportation network

... a new chaotic stream cipher-based cryptographic scheme to achieve secure data communica- tions over a wireless sensor network for intelligent trans- portation ... See full document

11

Cryptanalysis of a Substitution Permutation Network Using Gene Assembly in Ciliates

Cryptanalysis of a Substitution Permutation Network Using Gene Assembly in Ciliates

... the cipher. For this rea- son, based on the splicing rules of Section 4, we write an initial program to simulate the main blocks of cryptana- lysis according to the cipher parameters (such as genera- ... See full document

11

Show all 10000 documents...