Pseudo Random Bits' Generator Based on Tent Chaotic Map and Linear Feedback Shift Register
The unforeseeable demand for secure paradigm cannot be fulfilled by the arbitrary sequence generated by the linear feedback shift register, which means the generated sequence can't meet satisfy the unpredictable demand for secure paradigm. Tent chaotic equation combined with the linear property...
| Main Authors: | Ahmed, Hussam Alddin S., Mohamad Fadli, Zolkipli, Saba, M. Ismail, Alsariera, Yazan A. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publisher
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/22609/ http://umpir.ump.edu.my/id/eprint/22609/1/18.%20Pseudo%20random%20bits%E2%80%99%20generator%20based%20on%20Tent%20chaotic%20map%20and%20linear%20feedback%20shift%20register1.pdf |
Similar Items
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
A New Trend of Pseudorandom Number Generator using Multiple Chaotic Systems
by: Saba, M. Ismail, et al.
Published: (2018)
by: Saba, M. Ismail, et al.
Published: (2018)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors
by: AlRijeb, Mothena Fakhri Shaker, et al.
Published: (2025)
by: AlRijeb, Mothena Fakhri Shaker, et al.
Published: (2025)
Randomness analysis of pseudo random noise generator using 24-bits LFSR
by: Yaacob, Siti Hazwani, et al.
Published: (2014)
by: Yaacob, Siti Hazwani, et al.
Published: (2014)
Auto–transition in RADG based on chaotic system
by: Kadhum, Laith M., et al.
Published: (2023)
by: Kadhum, Laith M., et al.
Published: (2023)
A bat-inspired testing strategy for generating constraints pairwise test suite
by: Alsariera, Yazan A., et al.
Published: (2018)
by: Alsariera, Yazan A., et al.
Published: (2018)
A new method for generating cryptographically strong sequences of pseudo random bits for stream cipher
by: Khalifa, Othman Omran, et al.
Published: (2010)
by: Khalifa, Othman Omran, et al.
Published: (2010)
An adaptive minimum bit-error decision-feedback equalizer for UWB systems
by: Chung, Gwo Chin, et al.
Published: (2007)
by: Chung, Gwo Chin, et al.
Published: (2007)
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
A faster version of rijndael cryptographic algorithm using
cyclic shift and bit wise operations
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
by: Mohd Ali, Fakariah Hani, et al.
Published: (2009)
Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization
by: Kamal Zuhairi, Zamli, et al.
Published: (2023)
by: Kamal Zuhairi, Zamli, et al.
Published: (2023)
Least Significant Bit (LSB) and Random Right
Circular Shift (RRCF) in digital watermarking
by: Kurdi, Moustafa M., et al.
Published: (2016)
by: Kurdi, Moustafa M., et al.
Published: (2016)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015)
by: Masoumi, Amir Akhavan
Published: (2015)
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
by: Alzaidi, Amer Awad, et al.
Published: (2018)
by: Alzaidi, Amer Awad, et al.
Published: (2018)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Visual feedback and pseudo–haptic feedback improve manual lifting performance
by: Abdul Aziz, Faieza, et al.
Published: (2008)
by: Abdul Aziz, Faieza, et al.
Published: (2008)
TBat: A Novel Strategy for Minimization of T-Way Interaction
Test Suite Based on the Particle Swarm Optimization and the
Bat Algorithm
by: Kamal Z., Zamli, et al.
Published: (2016)
by: Kamal Z., Zamli, et al.
Published: (2016)
Setting up the Nyoongar Tent Embassy: A Report on Perth Media
by: Kerr, Thor, et al.
Published: (2013)
by: Kerr, Thor, et al.
Published: (2013)
Setting up the Nyoongar Tent Embassy: A report on Perth media
by: Kerr, Thor, et al.
Published: (2013)
by: Kerr, Thor, et al.
Published: (2013)
The scale invariants of pseudo-Zernike moments
by: Chong, Chee Way, et al.
Published: (2003)
by: Chong, Chee Way, et al.
Published: (2003)
An Improved Linear Feedback Shift Register (LFSR- based) Stream Cipher Generator
by: Mahdi, Reyadh H
Published: (2009)
by: Mahdi, Reyadh H
Published: (2009)
Natural ventilation design of UNHCR family tent / Karen Bong Hui Ju
by: Karen Bong , Hui Ju
Published: (2018)
by: Karen Bong , Hui Ju
Published: (2018)
Hybrid numeric-analytic method for solving chaotic system
by: Razali, NurIsnida, et al.
Published: (2013)
by: Razali, NurIsnida, et al.
Published: (2013)
Effects of feedback control on chaotic convection in fluid-saturated porous media
by: Roslan, R., et al.
Published: (2011)
by: Roslan, R., et al.
Published: (2011)
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
An efficient algorithm for fast computation of pseudo-Zernike moments
by: Chong, Chee-Way
Published: (2003)
by: Chong, Chee-Way
Published: (2003)
The multistage Adomian Decomposition Method for solving chaotic Lü System
by: Razali, Nur Isnida, et al.
Published: (2013)
by: Razali, Nur Isnida, et al.
Published: (2013)
The modified Adomian decomposition method for solving
Chaotic Lü system
by: Razali, Nur Iznida, et al.
Published: (2012)
by: Razali, Nur Iznida, et al.
Published: (2012)
Application of multistage homotopy perturbation method to the chaotic Genesio System
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
Low bit rate speech coding
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Low bit rate speech coders
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
Similar Items
-
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014) -
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019) -
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018) -
A New Trend of Pseudorandom Number Generator using Multiple Chaotic Systems
by: Saba, M. Ismail, et al.
Published: (2018) -
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)