International audienceThe confidentiality of information transmitted through the Internet requires an intensive use of pseudorandom number generators having strong security properties. For instance, these generators are used to produce encryption keys, to encrypt data with a one-time pad process, or to dissimulate information into cover media. In the previous International Conference on Evolving Internet (Internet 09, 10, and 11), we have proposed the use of discrete chaotic iterations to build pseudorandom number generators that receive two inputted possibly deficient generators, and mix them to produce pseudorandom numbers with high statistical qualities. In this article, we summarize these contributions and we propose simple applications...
Cryptographic algorithms have played an important role in information security for protecting privac...
International audienceWe propose a novel noise-resisting ciphering method resorting to a chaotic mul...
International audienceAs any well-designed information security application uses a very large quanti...
International audienceGuaranteeing the security of information transmitted through the Internet, aga...
Abstract—Guaranteeing the security of information transmit-ted through the Internet, against passive...
International audienceIn this paper, a new pseudo-random number generator (PRNG) based on chaotic it...
International audienceIn this paper, a new pseudo-random number generator (PRNG) based on chaotic it...
International audienceIn this paper, a new pseudo-random number generator (PRNG) based on chaotic it...
International audienceIn this paper, a new pseudo-random number generator (PRNG) based on chaotic it...
International audienceInternet communication systems involving cryptography and data hiding often re...
International audienceSecurity of information transmitted through the Internet, against passive or a...
International audienceIn this paper, a new chaotic pseudo-random number generator (PRNG) is proposed...
International audienceIn this paper, a new chaotic pseudo-random number generator (PRNG) is proposed...
International audienceThe design and engineering of original cryptographic solutions is a major conc...
Lots of researches indicate that the inefficient generation of random numbers is a significant bottl...
Cryptographic algorithms have played an important role in information security for protecting privac...
International audienceWe propose a novel noise-resisting ciphering method resorting to a chaotic mul...
International audienceAs any well-designed information security application uses a very large quanti...
International audienceGuaranteeing the security of information transmitted through the Internet, aga...
Abstract—Guaranteeing the security of information transmit-ted through the Internet, against passive...
International audienceIn this paper, a new pseudo-random number generator (PRNG) based on chaotic it...
International audienceIn this paper, a new pseudo-random number generator (PRNG) based on chaotic it...
International audienceIn this paper, a new pseudo-random number generator (PRNG) based on chaotic it...
International audienceIn this paper, a new pseudo-random number generator (PRNG) based on chaotic it...
International audienceInternet communication systems involving cryptography and data hiding often re...
International audienceSecurity of information transmitted through the Internet, against passive or a...
International audienceIn this paper, a new chaotic pseudo-random number generator (PRNG) is proposed...
International audienceIn this paper, a new chaotic pseudo-random number generator (PRNG) is proposed...
International audienceThe design and engineering of original cryptographic solutions is a major conc...
Lots of researches indicate that the inefficient generation of random numbers is a significant bottl...
Cryptographic algorithms have played an important role in information security for protecting privac...
International audienceWe propose a novel noise-resisting ciphering method resorting to a chaotic mul...
International audienceAs any well-designed information security application uses a very large quanti...