Ischemic-Stroke 发表于 2025-3-25 04:38:19

http://reply.papertrans.cn/23/2240/223914/223914_21.png

Gullible 发表于 2025-3-25 09:50:00

http://reply.papertrans.cn/23/2240/223914/223914_22.png

Eulogy 发表于 2025-3-25 15:40:49

1860-949X ryptography.Written by leading experts in the field.Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos‘ properties, such as randomness and ergo

Lacunar-Stroke 发表于 2025-3-25 17:56:04

http://reply.papertrans.cn/23/2240/223914/223914_24.png

离开可分裂 发表于 2025-3-25 20:54:18

,Cônes de Potentiels et Noyaux Subordonnés, the magnetic field of celestial bodies, and population growth in ecology) and laboratory (electrical circuits, lasers, chemical reactions, fluid dynamics, mechanical systems, and magneto-mechanical devices). Chaotic behavior has also found numerous applications in electrical and communication engin

Condense 发表于 2025-3-26 01:41:04

,Cônes de Potentiels et Noyaux Subordonnés, polynomials enjoy some nice chaotic properties, which makes them suitable for use in both encryption and digital signature. The cryptosystem can work either on real or integer numbers. The cryptosystem that works on real numbers is not secure and permits to recover the corresponding plaintext from

设想 发表于 2025-3-26 06:17:56

http://reply.papertrans.cn/23/2240/223914/223914_27.png

矿石 发表于 2025-3-26 09:43:08

On a Unified Characterization of Capacity, is only governed by some simple and low order deterministic rules, it possesses many distinct characteristics, such as deterministic but random-like complex temporal behavior, high sensitivity to initial conditions and system parameters, fractal structure, long-term unpredictability and so on. Thes

prodrome 发表于 2025-3-26 15:57:12

Admissible superharmonic functions,th input and returns a fixed-length value. As one of the cores of Cryptography, hashing is a basic technique widely used in information security. Utilizing chaos to construct hash function is a promising direction which attracts more and more attention. In this chapter, some preliminaries on hash fu

善变 发表于 2025-3-26 16:47:39

http://reply.papertrans.cn/23/2240/223914/223914_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Chaos-based Cryptography; Theory, Algorithms a Ljupco Kocarev,Shiguo Lian Book 2011 Springer Berlin Heidelberg 2011 Chaos-based Cryptograph