Results 11 to 20 of about 5,738 (242)
The Lyapunov exponent is primarily used to quantify the chaos of a dynamical system. However, it is difficult to compute the Lyapunov exponent of dynamical systems from a time series.
Kei Inoue
doaj +1 more source
Design of High-Dimensional Maps with Sine Terms
The use of the advancements in memristor technology to construct chaotic maps has garnered significant research attention in recent years. The combination of memristors and nonlinear terms provides an effective approach to proposing novel maps.
Othman Abdullah Almatroud +5 more
doaj +1 more source
Chaos based multiple order optical transform for 2D image encryption
In this paper, a robust yet simple and efficient method is proposed for a 2D image encryption. The purpose of this work is to plug the gap related to blind decryption and lack of randomness in optical transform domain which limits its application in ...
Gurpreet Kaur +2 more
doaj +1 more source
A New Symmetric Digital Video Encryption Model
In this paper a new symmetric cryptographic method for digital video file is presented. The proposed algorithm is based on combining two chaotic maps. Extended cryptographic is provided for evaluation and proving the efficiency and the level of security ...
Kordov Krasimir, Dimitrov Georgi
doaj +1 more source
Light-Weighted Password-Based Multi-Group Authenticated Key Agreement for Wireless Sensor Networks
Security is a critical issue for medical and health care systems. Password-based group-authenticated key agreement for wireless sensor networks (WSNs) allows a group of sensor nodes to negotiate a common session key by using password authentication and ...
Mao-Sung Chen +2 more
doaj +1 more source
CHAOTIC SYNCHRONIZATION SECURE COMMUNICATIONS BASED ON THE EXTENDED CHAOTIC MAPS SWITCH
A chaotic synchronization secure communication method based on chaotic maps switch is proposed. The extended chaotic model is first built to generate many kinds of chaotic signals based on changing parameters during different time durations. In the transmitter, the modulation is implemented by adding the information signal to chaotic carriers, taking a
null ZHANG JIA-SHU, null XIAO XIAN-CI
openaire +1 more source
Digital Cosine Chaotic Map for Cryptographic Applications
Despite having many similar characteristics with cryptography, existing chaotic systems have many security issues that negatively affect the chaos-based cryptographic algorithms that utilize them.
Moatsum Alawida +3 more
doaj +1 more source
Authentication and key agreement (AKA) play a major role in an open network environment to communicate between two or more participants securely. Authentication and key agreement protocols should protect sensitive data from a malevolent adversary by ...
Devanapalli Suresh +4 more
doaj +1 more source
Orbital dynamics in the Hill problem with oblateness
In this paper, we investigate the impact of the oblateness of the secondary body on the motion of a test particle in the near vicinity of the secondary body, specifically in the context of the extended version of the planar Hill problem.
Eman M. Moneer +5 more
doaj +1 more source
Quantum Image Encryption Using a Self-Adaptive Hash Function-Controlled Chaotic Map (SAHF-CCM)
Recently, quantum image encryption algorithms are attracting more and more attention, due to the upcoming quantum threat problem to the current cryptographic encryption algorithms with the rapid progress toward the quantum computer production. The aim of
Roayat Ismail Abdelfatah
doaj +1 more source

