诱骗 发表于 2025-3-28 16:55:17

Studies in Computational Intelligencehttp://image.papertrans.cn/c/image/223914.jpg

恃强凌弱的人 发表于 2025-3-28 19:37:18

http://reply.papertrans.cn/23/2240/223914/223914_42.png

EVICT 发表于 2025-3-28 23:40:04

Introduction to Chaos, the magnetic field of celestial bodies, and population growth in ecology) and laboratory (electrical circuits, lasers, chemical reactions, fluid dynamics, mechanical systems, and magneto-mechanical devices). Chaotic behavior has also found numerous applications in electrical and communication engin

牛马之尿 发表于 2025-3-29 04:44:21

http://reply.papertrans.cn/23/2240/223914/223914_44.png

不知疲倦 发表于 2025-3-29 09:27:06

Digitized Chaos for Pseudo-random Number Generation in Cryptography,ndom numbers is obtained referring to two types of devices, that are often properly combined together: True Random Number Generators (TRNGs), and Pseudo Random Number Generators (PRNGs). The former are devices that exploit truly stochastic physical phenomena , such as the electronic n

删减 发表于 2025-3-29 12:51:36

Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography, is only governed by some simple and low order deterministic rules, it possesses many distinct characteristics, such as deterministic but random-like complex temporal behavior, high sensitivity to initial conditions and system parameters, fractal structure, long-term unpredictability and so on. Thes

dendrites 发表于 2025-3-29 16:49:33

http://reply.papertrans.cn/23/2240/223914/223914_47.png

synovial-joint 发表于 2025-3-29 23:39:01

Chaos-Based Video Encryption Algorithms,widely in human society. Some multimedia data applied in entertainment, politics, economics, militaries, industries or education, etc., are necessary to be protected by providing confidentiality, integrity, and ownership or identity. To protect video contents, cryptology, which appears to be an effe
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Chaos-based Cryptography; Theory, Algorithms a Ljupco Kocarev,Shiguo Lian Book 2011 Springer Berlin Heidelberg 2011 Chaos-based Cryptograph