Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed the...
In this paper, a secure communication system composed of four chaotic oscillators is proposed. Two o...
This report is regarded as secure communication using chaotic dynamics. The nature of erratic behavi...
A new proposal to have secure communications in a system is reported. The basis is the use of a sync...
Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mism...
In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely ...
In this paper, we discuss the use of chaotic signals in cryptography. A comparative analysis of thre...
In this paper, we discuss the use of chaotic signals in cryptography. A comparative analysis of thre...
In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely ...
Research on chaos-based communication, or simply chaotic communication, has been ongoing since the e...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...
A chaotic dynamical system is a deterministic nonlinear system that has noise-like state trajectorie...
This paper studies the security of a secure communication scheme based on two discrete-time intermit...
In this paper, a new a secure communication scheme using chaotic signal for transmitting binary digi...
This article presents an alternative for resolving the existing vulnerability of systems that implem...
In this paper, a secure communication system composed of four chaotic oscillators is proposed. Two o...
This report is regarded as secure communication using chaotic dynamics. The nature of erratic behavi...
A new proposal to have secure communications in a system is reported. The basis is the use of a sync...
Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mism...
In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely ...
In this paper, we discuss the use of chaotic signals in cryptography. A comparative analysis of thre...
In this paper, we discuss the use of chaotic signals in cryptography. A comparative analysis of thre...
In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely ...
Research on chaos-based communication, or simply chaotic communication, has been ongoing since the e...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...
A chaotic dynamical system is a deterministic nonlinear system that has noise-like state trajectorie...
This paper studies the security of a secure communication scheme based on two discrete-time intermit...
In this paper, a new a secure communication scheme using chaotic signal for transmitting binary digi...
This article presents an alternative for resolving the existing vulnerability of systems that implem...
In this paper, a secure communication system composed of four chaotic oscillators is proposed. Two o...
This report is regarded as secure communication using chaotic dynamics. The nature of erratic behavi...
A new proposal to have secure communications in a system is reported. The basis is the use of a sync...