Chaotic systems and chaos-based applications have been commonly used in the fields of engineering recently. The most essential part of them is the chaotic oscillator that has very critical role in some applications such as chaotic communications and cryptography. In this study, Sundarapandian-Pehlivan chaotic system has been modeled and simulated in three distinct platforms to show the advantages of FPGA-based chaotic oscillator with respect to alternative solutions. In the first stage, the chaotic system has been modeled numerically by the help of fourth order of Runge-Kutta (RK4) method. Additionally, phase portraits of the system have been obtained and Lyapunov exponents have been examined. Secondly, the system has been modeled by using ...
24th Signal Processing and Communication Application Conference (SIU) -- MAY 16-19, 2016 -- Zongulda...
Pseudorandom numbers are widely used in information encryption, spread spectrum communication and ot...
It is well observed that cryptographic applications have great challenges in guaranteeing high secu...
22nd IEEE Signal Processing and Communications Applications Conference (SIU) -- APR 23-25, 2014 -- K...
Chaos and chaotic systems, one of the most important work areas in recent years, are used in areas s...
In this study, autonomous Lu-Chen (2002) chaotic system has been implemented on FPGA using Heun nume...
In this study, numerical, analog and digital circuit modellings were presented with 3 dimensional, c...
23nd Signal Processing and Communications Applications Conference (SIU) -- MAY 16-19, 2015 -- Inonu ...
Rasgele sayı üreteçleri kriptografi, Monte-Carlo metodunun kullanıldığı uygulamalar, bilgisayar benz...
In this study, a new continuous-time autonomous chaotic system has been presented and implemented on...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
It is well observed that cryptographic applications have great challenges in guaranteeing high secur...
This paper presents a novel, real time, high speed and robust chaos-based pseudo random number gener...
In this study, a new continuous-time autonomous chaotic system has been presented and implemented on...
International audienceNowadays, chaos-based cryptographicprimitives are used as an alternative to cl...
24th Signal Processing and Communication Application Conference (SIU) -- MAY 16-19, 2016 -- Zongulda...
Pseudorandom numbers are widely used in information encryption, spread spectrum communication and ot...
It is well observed that cryptographic applications have great challenges in guaranteeing high secu...
22nd IEEE Signal Processing and Communications Applications Conference (SIU) -- APR 23-25, 2014 -- K...
Chaos and chaotic systems, one of the most important work areas in recent years, are used in areas s...
In this study, autonomous Lu-Chen (2002) chaotic system has been implemented on FPGA using Heun nume...
In this study, numerical, analog and digital circuit modellings were presented with 3 dimensional, c...
23nd Signal Processing and Communications Applications Conference (SIU) -- MAY 16-19, 2015 -- Inonu ...
Rasgele sayı üreteçleri kriptografi, Monte-Carlo metodunun kullanıldığı uygulamalar, bilgisayar benz...
In this study, a new continuous-time autonomous chaotic system has been presented and implemented on...
International audiencePseudo-Random Number Generator of Chaotic Sequences (PRNG-CS) has caught the a...
It is well observed that cryptographic applications have great challenges in guaranteeing high secur...
This paper presents a novel, real time, high speed and robust chaos-based pseudo random number gener...
In this study, a new continuous-time autonomous chaotic system has been presented and implemented on...
International audienceNowadays, chaos-based cryptographicprimitives are used as an alternative to cl...
24th Signal Processing and Communication Application Conference (SIU) -- MAY 16-19, 2016 -- Zongulda...
Pseudorandom numbers are widely used in information encryption, spread spectrum communication and ot...
It is well observed that cryptographic applications have great challenges in guaranteeing high secu...