治愈 发表于 2025-3-23 10:18:06
http://reply.papertrans.cn/23/2240/223914/223914_11.png解开 发表于 2025-3-23 15:54:01
Martingale Theory - Potential Theory,rom a theoretical point of view, due to their deterministic nature, PRNGs are potentially predictable by observing their generated sequences . Nevertheless, in literature some families of PRNGs are classified to be ‘secure’, meaning that their algorithmic structure involves calculationsobstruct 发表于 2025-3-23 18:59:42
On a Unified Characterization of Capacity, high-dimensional chaotic maps and their dynamical characteristics are studied. As reflected by the statistical results, strong mixing nature is acquired and these high-dimensional chaotic maps are ready for various cryptographic usages. Firstly, it is used as a simple but effective post-processing北极熊 发表于 2025-3-24 01:27:01
Admissible superharmonic functions,pical chaos-based hash functions are described. Finally, by borrowing some principles from classical Cryptography, we summarize some instructions on chaos-based hash function secure construction which is beneficial to the hash function design based on chaos in the future.裁决 发表于 2025-3-24 06:09:58
http://reply.papertrans.cn/23/2240/223914/223914_15.pngCeramic 发表于 2025-3-24 07:17:49
,Das ökonomische Phänomen Goodwill,adigm. The model of .’s numerical method to resolve . chaotic system requirements used as key generator for data encryption applications is detailed. This chapter describes this approach and presents a case study where the . chaotic system is implemented on a . Chip.猜忌 发表于 2025-3-24 13:51:24
,Das ökonomische Phänomen Goodwill,rized and eavesdropping receivers are discussed. Finally, ultra-fast physical random number generators based on chaotic optical signals, as well as the potential of exploiting them in secure communication systems, are investigated.蜡烛 发表于 2025-3-24 17:25:19
http://reply.papertrans.cn/23/2240/223914/223914_18.pngbrassy 发表于 2025-3-24 18:59:16
Potential Theory: Copenhagen 1979ctive way for information security, has been employed in many practical applications. However, traditional ciphers like DES , IDEA , RSA and AES, are often used for text or binary data, while not suitable for direct video encryption because of the following reasons.我悲伤 发表于 2025-3-25 00:35:14
,Cônes de Potentiels et Noyaux Subordonnés,ke algorithms when using Chebyshev polynomials on integer numbers are secure as the aforementioned encryption algorithms. The chaos-based cryptography is discussed from a point of view which we believe is closer to the spirit of both cryptography and chaos theory than the way the subject has been treated recently by many researchers.