CONTROLLED HENON SYSTEM AND ITS CRYPTOGRAPHIC APPLICATIONS (Q3065766): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 2 users not shown)
Property / author
 
Property / author: Ali Kanso / rank
Normal rank
 
Property / author
 
Property / author: Ali Kanso / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of an ergodic chaotic cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalyzing a discrete-time chaos synchronization secure communication system / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking parameter modulated chaotic secure communication system / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking projective chaos synchronization secure communication using filtering and generalized synchronization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of a discrete-time synchronous chaotic encryption system / rank
 
Normal rank
Property / cites work
 
Property / cites work: Comments on "Chaotic digital encoding: an approach to secure communication" and reply / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chaotic encryption using discrete-time synchronous chaos / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure digital communication using discrete-time chaos synchronization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication by chaotic signals: the inverse system approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Designing security for number sequences generated by means of the sawtooth chaotic map / rank
 
Normal rank
Property / cites work
 
Property / cites work: IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS / rank
 
Normal rank
Property / cites work
 
Property / cites work: EXPERIMENTAL DEMONSTRATION OF SECURE COMMUNICATIONS VIA CHAOTIC SYNCHRONIZATION / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom bits generated by chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new spatiotemporally chaotic cryptosystem and its security and performance analyses / rank
 
Normal rank
Property / cites work
 
Property / cites work: Controlling chaos / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chaos in Dynamical Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: TRANSMISSION OF DIGITAL SIGNALS BY CHAOTIC SYNCHRONIZATION / rank
 
Normal rank
Property / cites work
 
Property / cites work: Synchronization in chaotic systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5198578 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encryption and decryption of images with chaotic map lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Theory of Secrecy Systems* / rank
 
Normal rank
Property / cites work
 
Property / cites work: UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME / rank
 
Normal rank
Property / cites work
 
Property / cites work: A SIMPLE METHOD TO REVEAL THE PARAMETERS OF THE LORENZ SYSTEM / rank
 
Normal rank
Property / cites work
 
Property / cites work: A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parameter estimation only from the symbolic sequences generated by chaos system / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography based on chaotic systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extracting information masked by chaos and contaminated with noise: some considerations on the security of communication approaches using chaos. / rank
 
Normal rank

Latest revision as of 15:29, 3 July 2024

scientific article
Language Label Description Also known as
English
CONTROLLED HENON SYSTEM AND ITS CRYPTOGRAPHIC APPLICATIONS
scientific article

    Statements

    CONTROLLED HENON SYSTEM AND ITS CRYPTOGRAPHIC APPLICATIONS (English)
    0 references
    6 January 2011
    0 references
    0 references
    0 references
    0 references
    0 references
    chaos
    0 references
    cryptography
    0 references
    stream ciphers
    0 references
    Henon system
    0 references
    controlled Henon system
    0 references
    0 references
    0 references
    0 references