Cryptography with chaos and shadowing
From MaRDI portal
Publication:603949
DOI10.1016/j.chaos.2009.03.128zbMath1198.94126OpenAlexW2026935296MaRDI QIDQ603949
Publication date: 8 November 2010
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.chaos.2009.03.128
Cryptography (94A60) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Approximate trajectories (pseudotrajectories, shadowing, etc.) in smooth dynamics (37C50)
Related Items (9)
On the dynamics of a discrete difference map in Mann orbit ⋮ Stochastic degradation of the fixed-point version of 2D-chaotic maps ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Performance improvement of chaotic encryption via energy and frequency location criteria ⋮ Topological average shadowing property on uniform spaces ⋮ CIPHER SYSTEMS BASED ON CONTROLLED EXACT CHAOTIC MAPS ⋮ A novel four-step feedback procedure for rapid control of chaotic behavior of the logistic map and unstable traffic on the road ⋮ Discrete Chaotification of a Modulated Logistic System
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Cryptography with cycling chaos
- Is every approximate trajectory of some process near an exact trajectory of a nearby process?
- A new chaotic cryptosystem
- Do numerical orbits of chaotic dynamical processes represent true orbits?
- \(\omega\)-limit sets for axiom A diffeomorphisms
- A fast chaotic cryptographic scheme with dynamic look-up table
- Cryptography with chaos at the physical level
- Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems
- A combined chaotic cryptographic and hashing scheme
- A chaotic cryptography scheme for generating short ciphertext
- Cryptanalysis of an ergodic chaotic cipher
- Cryptography with chaos
- A novel algorithm for image encryption based on mixture of chaotic maps
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Numerical orbits of chaotic processes represent true orbits
- Pseudo-Orbit Shadowing in the Family of Tent Maps
- Rigorous verification of trajectories for the computer simulation of dynamical systems
- A Secret Key Cryptosystem by Iterating a Chaotic Map
- Using chaos to shadow the quadratic map for all time
- Signal Extraction from Chaotic Communications
- Chaos and cryptography
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Synchronization in chaotic systems
- Cryptosystems with discretized chaotic maps
- APPLICATION OF DISCRETE CHAOTIC DYNAMICAL SYSTEMS IN CRYPTOGRAPHY — DCC METHOD
- A PROBABILISTIC SYMMETRIC ENCRYPTION SCHEME FOR VERY FAST SECURE COMMUNICATION BASED ON CHAOTIC SYSTEMS OF DIFFERENCE EQUATIONS
- Use of chaotic dynamical systems in cryptography
- Analysis of some recently proposed chaos-based encryption algorithms
- A modified chaotic cryptographic method
This page was built for publication: Cryptography with chaos and shadowing