Abstract:- We have created an innovative method for the production of binary series of arbitrary length, which appear to be random to an uninformed third party. Our method is based on the symbolic dynamics of a special family of recursive maps exhibiting extremely complex trajectories in their phase space. Among other applications, our binary series can be used as encryption keys in protocols based on the Vernam ‘one time only ’ secure communication protocol. Based on fast software implementation, due to the simple form of the defining formulas, such protocols would combine the absolute security of the Vernam protocol with an ease and speed of use that would permit their application in every form of digital communications in the Internet or...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
Communication techniques have witnessed rapid development in recent years, especially the internet a...
Abstract:- A new method of creating random number series to be used as encryption keys is presented....
Abstract: A discrete iterative map is utilized for the creation of random number series. It contains...
Abstract: A discrete dynamic system is utilized for the creation of random number series. It contain...
Internet communication is often encrypted with the aid of mathematical problems that are hard to sol...
The desire to transmit messages securely is not new. For centuries, community kept communication in ...
This paper is an introduction to the use of mathematics in two important aspects of electronic commu...
The design of algorithms for sending confidential messages (i.e. messages that no one can read, exce...
Nowadays, network security plays a major role in the field of wireless communications. Wired network...
Nowadays, network security plays a major role in the field of wireless communications. Wired network...
In this paper we have developed a new symmetric key algorithm for encryption and decryption of data ...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
Abstract. Security of cryptographic symmetric primitives is studied in this thesis. Pseudorandomness...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
Communication techniques have witnessed rapid development in recent years, especially the internet a...
Abstract:- A new method of creating random number series to be used as encryption keys is presented....
Abstract: A discrete iterative map is utilized for the creation of random number series. It contains...
Abstract: A discrete dynamic system is utilized for the creation of random number series. It contain...
Internet communication is often encrypted with the aid of mathematical problems that are hard to sol...
The desire to transmit messages securely is not new. For centuries, community kept communication in ...
This paper is an introduction to the use of mathematics in two important aspects of electronic commu...
The design of algorithms for sending confidential messages (i.e. messages that no one can read, exce...
Nowadays, network security plays a major role in the field of wireless communications. Wired network...
Nowadays, network security plays a major role in the field of wireless communications. Wired network...
In this paper we have developed a new symmetric key algorithm for encryption and decryption of data ...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
Abstract. Security of cryptographic symmetric primitives is studied in this thesis. Pseudorandomness...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
Communication techniques have witnessed rapid development in recent years, especially the internet a...