Advances in network technology have enhanced the concern for network security issues. In order to address the problem that hopping graph are vulnerable to external attacks (e.g., the changing rules of fixed graphs are more easily grasped by attackers) and the challenge of achieving both interactivity and randomness in a network environment, this paper proposed a scheme for a dynamic graph based on chaos and cryptographic random mapping. The scheme allows hopping nodes to compute and obtain dynamically random and uncorrelated graph of other nodes independently of each other without additional interaction after the computational process of synchronous mirroring. We first iterate through the chaos algorithm to generate random seed parameters, ...
Abstract: Nowadays, the importance of implementing a secure communication system that protects the p...
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
Random Decentering Algorithm (RDA) on a undirected unweighted graph is defined and tested over sever...
Abstract—With the widespread use of communication tech-nologies, cryptosystems are therefore critica...
Communication techniques have witnessed rapid development in recent years, especially the internet a...
Abstract:- A new method of creating random number series to be used as encryption keys is presented....
Chaos-based stream ciphers form a prospective class of data encryption techniques. Usually, in chaos...
International audienceWith the widespread use of communication technologies, cryptosystems are there...
Abstract Dynamic networks are networks with temporal relationship features which evolve over time by...
Cryptographic algorithms have played an important role in information security for protecting privac...
The information transmission domain had well been extended by the recent and fast developments in th...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
Workshop « Analyse du chaos et applications », December 6, 2019, ENSEA, Cergy.With the rapid develop...
The secure communication through synchronization between two identic chaotic systems have recently g...
Abstract: Nowadays, the importance of implementing a secure communication system that protects the p...
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...
Random Decentering Algorithm (RDA) on a undirected unweighted graph is defined and tested over sever...
Abstract—With the widespread use of communication tech-nologies, cryptosystems are therefore critica...
Communication techniques have witnessed rapid development in recent years, especially the internet a...
Abstract:- A new method of creating random number series to be used as encryption keys is presented....
Chaos-based stream ciphers form a prospective class of data encryption techniques. Usually, in chaos...
International audienceWith the widespread use of communication technologies, cryptosystems are there...
Abstract Dynamic networks are networks with temporal relationship features which evolve over time by...
Cryptographic algorithms have played an important role in information security for protecting privac...
The information transmission domain had well been extended by the recent and fast developments in th...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
Workshop « Analyse du chaos et applications », December 6, 2019, ENSEA, Cergy.With the rapid develop...
The secure communication through synchronization between two identic chaotic systems have recently g...
Abstract: Nowadays, the importance of implementing a secure communication system that protects the p...
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied...
Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have bec...