Cryptanalysis and improvement of a block cipher based on multiple chaotic systems.
He, Jun, Qian, Haifeng, Zhou, Yuan, Li, Zhibin (2010)
Mathematical Problems in Engineering
Similarity:
He, Jun, Qian, Haifeng, Zhou, Yuan, Li, Zhibin (2010)
Mathematical Problems in Engineering
Similarity:
Volodymyr Lynnyk, Sergej Čelikovský (2010)
Kybernetika
Similarity:
In this paper, a modified version of the Chaos Shift Keying (CSK) scheme for secure encryption and decryption of data will be discussed. The classical CSK method determines the correct value of binary signal through checking which initially unsynchronized system is getting synchronized. On the contrary, the new anti-synchronization CSK (ACSK) scheme determines the wrong value of binary signal through checking which already synchronized system is loosing synchronization. The ACSK scheme...
Ou, Baiyu, Liu, Desheng (2010)
Mathematical Problems in Engineering
Similarity:
Ou, Baiyu, Liu, Desheng (2010)
Discrete Dynamics in Nature and Society
Similarity:
Qian Fang, Ying Liu, Xiaoqun Zhao (2008)
Kybernetika
Similarity:
Security mechanisms for wireless sensor networks (WSN) face a great challenge due to the restriction of their small sizes and limited energy. Hence, many protocols for WSN are not designed with the consideration of security. Chaotic cryptosystems have the advantages of high security and little cost of time and space, so this paper proposes a secure cluster routing protocol based on chaotic encryption as well as a conventional symmetric encryption scheme. First, a principal-subordinate...
Fiorella Argenti, A. De Angeli, E. Del Re, Roberto Genesio, Plinio Pagni, Alberto Tesi (1997)
Kybernetika
Similarity: