E-Book, Englisch, Band 354, 398 Seiten, eBook
Kocarev / Lian Chaos-based Cryptography
Erscheinungsjahr 2011
ISBN: 978-3-642-20542-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Theory, Algorithms and Applications
E-Book, Englisch, Band 354, 398 Seiten, eBook
Reihe: Studies in Computational Intelligence
ISBN: 978-3-642-20542-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
1.Introduction to Chaos.- 2.Chaos-based Cryptography 3.Digitized Chaos for Pseudo-Random Number Generation in Cryptography .- 4.Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography .- 5.Chaos based hash function.- 6.Chaos-Based Video Encryption Algorithms .- 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 4.Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography .- 5.Chaos based hash function.- 6.Chaos-Based Video Encryption Algorithms .- 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 5.Chaos based hash function.- 6.Chaos-Based Video Encryption Algorithms .- 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms.- 6.Chaos-Based Video Encryption Algorithms .- 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 6.Chaos-Based Video Encryption Algorithms .- 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-basedciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and MobilePlatforms .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms.