International audienceWith the widespread use of communication technologies, cryptosystems are therefore critical to guarantee security over open networks as the Internet. Pseudo-random number generators (PRNGs) are fundamental in cryptosystems and information hiding schemes. One of the existing chaos-based PRNGs is using chaotic iterations schemes. In prior literature, the iterate function is just the vectorial boolean negation. In this paper, we propose a method using Graph with strongly connected components as a selection criterion for chaotic iterate function. In order to face the challenge of using the proposed chaotic iterate functions in PRNG, these PRNGs are subjected to a statistical battery of tests, which is the well-known NIST i...
International audienceSecurity of information transmitted through the Internet, against passive or a...
Symposium on Signal Processing for Wireless and Multimedia Communications (SPWMC'16)International au...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
Abstract—With the widespread use of communication tech-nologies, cryptosystems are therefore critica...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
International audienceA new pseudo-random number generator (PRNG) is proposed. The principle of the ...
Workshop « Analyse du chaos et applications », December 6, 2019, ENSEA, Cergy.With the rapid develop...
Abstract—Guaranteeing the security of information transmit-ted through the Internet, against passive...
The information transmission domain had well been extended by the recent and fast developments in th...
International audienceThere is not a proper mathematical definition of chaos, we have instead a quit...
International audienceGenerating random numbers is essential in manycryptographic applications like ...
International audienceIn this paper, a new chaotic pseudo-random number generator (PRNG) is proposed...
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applicatio...
In this paper, a surjective mapping that satisfies the Li–Yorke chaos in the unit area is constructe...
International audienceIn this paper, a new pseudo-random number generator (PRNG) based on chaotic it...
International audienceSecurity of information transmitted through the Internet, against passive or a...
Symposium on Signal Processing for Wireless and Multimedia Communications (SPWMC'16)International au...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...
Abstract—With the widespread use of communication tech-nologies, cryptosystems are therefore critica...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
International audienceA new pseudo-random number generator (PRNG) is proposed. The principle of the ...
Workshop « Analyse du chaos et applications », December 6, 2019, ENSEA, Cergy.With the rapid develop...
Abstract—Guaranteeing the security of information transmit-ted through the Internet, against passive...
The information transmission domain had well been extended by the recent and fast developments in th...
International audienceThere is not a proper mathematical definition of chaos, we have instead a quit...
International audienceGenerating random numbers is essential in manycryptographic applications like ...
International audienceIn this paper, a new chaotic pseudo-random number generator (PRNG) is proposed...
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applicatio...
In this paper, a surjective mapping that satisfies the Li–Yorke chaos in the unit area is constructe...
International audienceIn this paper, a new pseudo-random number generator (PRNG) based on chaotic it...
International audienceSecurity of information transmitted through the Internet, against passive or a...
Symposium on Signal Processing for Wireless and Multimedia Communications (SPWMC'16)International au...
Abstract: During last one and half decade an interesting relationship between chaos and cryptography...