治愈 发表于 2025-3-23 10:18:06

http://reply.papertrans.cn/23/2240/223914/223914_11.png

解开 发表于 2025-3-23 15:54:01

Martingale Theory - Potential Theory,rom a theoretical point of view, due to their deterministic nature, PRNGs are potentially predictable by observing their generated sequences . Nevertheless, in literature some families of PRNGs are classified to be ‘secure’, meaning that their algorithmic structure involves calculations

obstruct 发表于 2025-3-23 18:59:42

On a Unified Characterization of Capacity, high-dimensional chaotic maps and their dynamical characteristics are studied. As reflected by the statistical results, strong mixing nature is acquired and these high-dimensional chaotic maps are ready for various cryptographic usages. Firstly, it is used as a simple but effective post-processing

北极熊 发表于 2025-3-24 01:27:01

Admissible superharmonic functions,pical chaos-based hash functions are described. Finally, by borrowing some principles from classical Cryptography, we summarize some instructions on chaos-based hash function secure construction which is beneficial to the hash function design based on chaos in the future.

裁决 发表于 2025-3-24 06:09:58

http://reply.papertrans.cn/23/2240/223914/223914_15.png

Ceramic 发表于 2025-3-24 07:17:49

,Das ökonomische Phänomen Goodwill,adigm. The model of .’s numerical method to resolve . chaotic system requirements used as key generator for data encryption applications is detailed. This chapter describes this approach and presents a case study where the . chaotic system is implemented on a . Chip.

猜忌 发表于 2025-3-24 13:51:24

,Das ökonomische Phänomen Goodwill,rized and eavesdropping receivers are discussed. Finally, ultra-fast physical random number generators based on chaotic optical signals, as well as the potential of exploiting them in secure communication systems, are investigated.

蜡烛 发表于 2025-3-24 17:25:19

http://reply.papertrans.cn/23/2240/223914/223914_18.png

brassy 发表于 2025-3-24 18:59:16

Potential Theory: Copenhagen 1979ctive way for information security, has been employed in many practical applications. However, traditional ciphers like DES , IDEA , RSA and AES, are often used for text or binary data, while not suitable for direct video encryption because of the following reasons.

我悲伤 发表于 2025-3-25 00:35:14

,Cônes de Potentiels et Noyaux Subordonnés,ke algorithms when using Chebyshev polynomials on integer numbers are secure as the aforementioned encryption algorithms. The chaos-based cryptography is discussed from a point of view which we believe is closer to the spirit of both cryptography and chaos theory than the way the subject has been treated recently by many researchers.
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Chaos-based Cryptography; Theory, Algorithms a Ljupco Kocarev,Shiguo Lian Book 2011 Springer Berlin Heidelberg 2011 Chaos-based Cryptograph