找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Chaos-based Cryptography; Theory, Algorithms a Ljupco Kocarev,Shiguo Lian Book 2011 Springer Berlin Heidelberg 2011 Chaos-based Cryptograph

[復制鏈接]
查看: 36615|回復: 47
樓主
發(fā)表于 2025-3-21 16:33:57 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Chaos-based Cryptography
副標題Theory, Algorithms a
編輯Ljupco Kocarev,Shiguo Lian
視頻videohttp://file.papertrans.cn/224/223914/223914.mp4
概述Thorough description and recent research of chaos-based cryptography.Covers the basic theories, algorithms and applications of chaos-based cryptography.Written by leading experts in the field
叢書名稱Studies in Computational Intelligence
圖書封面Titlebook: Chaos-based Cryptography; Theory, Algorithms a Ljupco Kocarev,Shiguo Lian Book 2011 Springer Berlin Heidelberg 2011 Chaos-based Cryptograph
描述.Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos‘ properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection..?.The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. .?.The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography..?.
出版日期Book 2011
關(guān)鍵詞Chaos-based Cryptography; Chaos-based Digital Watermarking; Chaos-based Encryptio; Chaos-based Pseudora
版次1
doihttps://doi.org/10.1007/978-3-642-20542-2
isbn_softcover978-3-662-50653-0
isbn_ebook978-3-642-20542-2Series ISSN 1860-949X Series E-ISSN 1860-9503
issn_series 1860-949X
copyrightSpringer Berlin Heidelberg 2011
The information of publication is updating

書目名稱Chaos-based Cryptography影響因子(影響力)




書目名稱Chaos-based Cryptography影響因子(影響力)學科排名




書目名稱Chaos-based Cryptography網(wǎng)絡公開度




書目名稱Chaos-based Cryptography網(wǎng)絡公開度學科排名




書目名稱Chaos-based Cryptography被引頻次




書目名稱Chaos-based Cryptography被引頻次學科排名




書目名稱Chaos-based Cryptography年度引用




書目名稱Chaos-based Cryptography年度引用學科排名




書目名稱Chaos-based Cryptography讀者反饋




書目名稱Chaos-based Cryptography讀者反饋學科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

1票 100.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:07:39 | 只看該作者
板凳
發(fā)表于 2025-3-22 03:56:12 | 只看該作者
Digitized Chaos for Pseudo-random Number Generation in Cryptography,rom a theoretical point of view, due to their deterministic nature, PRNGs are potentially predictable by observing their generated sequences [8, 9, 10, 1]. Nevertheless, in literature some families of PRNGs are classified to be ‘secure’, meaning that their algorithmic structure involves calculations
地板
發(fā)表于 2025-3-22 04:51:51 | 只看該作者
5#
發(fā)表于 2025-3-22 12:06:49 | 只看該作者
6#
發(fā)表于 2025-3-22 13:14:41 | 只看該作者
Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers,zation though had to overcome the desynchronization induced by the message itself. After this initial stage, the number of proposals which exploited the properties of chaotic maps for cryptographical purposes, grew in a spectacular way.
7#
發(fā)表于 2025-3-22 17:08:53 | 只看該作者
Hardware Implementation of Chaos Based Cipher: Design of Embedded Systems for Security Applicationsadigm. The model of .’s numerical method to resolve . chaotic system requirements used as key generator for data encryption applications is detailed. This chapter describes this approach and presents a case study where the . chaotic system is implemented on a . Chip.
8#
發(fā)表于 2025-3-22 23:13:11 | 只看該作者
Hardware Implementation of Chaos-Secured Optical Communication Systems,rized and eavesdropping receivers are discussed. Finally, ultra-fast physical random number generators based on chaotic optical signals, as well as the potential of exploiting them in secure communication systems, are investigated.
9#
發(fā)表于 2025-3-23 01:22:29 | 只看該作者
Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms,tion on different architectures. Our experiments reveal that chaos-based schemes outperform the conventional AES implementation in terms of CPU usage, encryption speed, and energy consumption. Particularly they consume 300-400% less CPU power, and have over 250% faster encryption speed. However, the
10#
發(fā)表于 2025-3-23 08:30:54 | 只看該作者
Book 2011t of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography..?.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-16 02:00
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
广安市| 南涧| 邵武市| 平武县| 朔州市| 富宁县| 内丘县| 梓潼县| 弥勒县| 黄冈市| 桑植县| 梅州市| 博罗县| 龙川县| 临漳县| 天峻县| 淳化县| 皋兰县| 陵川县| 洪湖市| 乡宁县| 西藏| 饶平县| 马公市| 游戏| 西林县| 乡宁县| 福鼎市| 墨竹工卡县| 沙湾县| 宁强县| 扎赉特旗| 平果县| 宜宾市| 昌平区| 民乐县| 彭阳县| 桦南县| 望城县| 宣汉县| 罗江县|