Chaotic pseudorandom sequences and the security of cryptosystems
The generation of pseudo-random numbers (bits) plays a critical role in a large number of applications such as statistical mechanics, numerical simulations, gaming industry, communication or cryptography. The choice of secret keys for cryptographic primitives largely depends on the quality of random...
| Main Authors: | Hina, Aliyu Danladi, Md Said, Mohamad Rushdan, Banerjee, Santo |
|---|---|
| Other Authors: | Erçetin, Şefika Şule |
| Format: | Book Section |
| Language: | English |
| Published: |
Springer International Publishing
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/47321/ http://psasir.upm.edu.my/id/eprint/47321/1/Chaotic%20pseudorandom%20sequences%20and%20the%20security%20of%20cryptosystems.pdf |
Similar Items
Generation and statistical analysis of chaos-based pseudorandom sequences
by: Hina, Aliyu Danladi
Published: (2019)
by: Hina, Aliyu Danladi
Published: (2019)
Synchronization between two discrete chaotic systems for secure communications
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2016)
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2016)
Cryptanalysis of a family of 1D unimodal maps
by: Md Said, Mohamad Rushdan, et al.
Published: (2017)
by: Md Said, Mohamad Rushdan, et al.
Published: (2017)
A New Trend of Pseudorandom Number Generator using Multiple Chaotic Systems
by: Saba, M. Ismail, et al.
Published: (2018)
by: Saba, M. Ismail, et al.
Published: (2018)
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Security Analysis of a Public Key Cryptosystem for Synchronized Chaotic Systems
by: Mahad, Zahari, et al.
Published: (2022)
by: Mahad, Zahari, et al.
Published: (2022)
A new class of efficient piecewise nonlinear chaotic maps for secure cryptosystems
by: Li, Y., et al.
Published: (2009)
by: Li, Y., et al.
Published: (2009)
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
by: Daud, Muhamad Azlan
Published: (2014)
by: Daud, Muhamad Azlan
Published: (2014)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
The use of pseudorandom sweeps for vibroseis surveys
by: Dean, Timothy
Published: (2014)
by: Dean, Timothy
Published: (2014)
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
Surface and downhole recording of pseudorandom vibroseis sweeps
by: Dean, Timothy, et al.
Published: (2015)
by: Dean, Timothy, et al.
Published: (2015)
On the hastad's attack to LUC4,6 cryptosystem and compared with other RSA-type cryptosystem
by: Wong, Tze Jin, et al.
Published: (2013)
by: Wong, Tze Jin, et al.
Published: (2013)
A new cryptosystem analogous to LUCELG and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2009)
by: Muslim, Norliana, et al.
Published: (2009)
The extensions on algebraic attack in AES cryptosystem
by: RezaeiPour, Davood, et al.
Published: (2009)
by: RezaeiPour, Davood, et al.
Published: (2009)
Computation of private key for LUC cryptosystem
by: Md Ali, Zulkarnain, et al.
Published: (2009)
by: Md Ali, Zulkarnain, et al.
Published: (2009)
Key exchange for new cryptosystem analogous to LUCELG
and Cramer-Shoup
by: Muslim, Norliana, et al.
Published: (2013)
by: Muslim, Norliana, et al.
Published: (2013)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
A Cryptosystem Analogous to LUCELG and a
Digital Signature Scheme
by: Yoong, Choo Mun, et al.
Published: (2005)
by: Yoong, Choo Mun, et al.
Published: (2005)
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
An efficient computation technique for cryptosystems based on Lucas functions
by: Md Ali, Zulkarnain, et al.
Published: (2008)
by: Md Ali, Zulkarnain, et al.
Published: (2008)
Generalized projective series synchronization between chaotic systems and its application
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2017)
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2017)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
On the common modulus attack into the LUC4,6 cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
Provably secure randomized AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2015)
Computation of cryptosystem based on Lucas functions using addition chain
by: Md Ali, Zulkarnain, et al.
Published: (2010)
by: Md Ali, Zulkarnain, et al.
Published: (2010)
On the mathematical complexity and the time implementation
of proposed variants of elliptic curves cryptosystems
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
Rounding theorem the possibility of applying cryptosystem on the decimal numbers.
by: Alfaris, Rand, et al.
Published: (2008)
by: Alfaris, Rand, et al.
Published: (2008)
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
by: Wong, Tze Jin
Published: (2006)
by: Wong, Tze Jin
Published: (2006)
An improvement of LUC2 cryptosystem algorithm using doubling with remainder
by: Othman, Mohamed, et al.
Published: (2006)
by: Othman, Mohamed, et al.
Published: (2006)
Ternary pseudorandom signal design for uniform excitation and reduced effect of nonlinear distortion
by: Tan, A.H., et al.
Published: (2006)
by: Tan, A.H., et al.
Published: (2006)
A security upgrade on the GGH lattice-based cryptosystem
by: Arif Mandangan,, et al.
Published: (2020)
by: Arif Mandangan,, et al.
Published: (2020)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
Provably secure Rabin-p cryptosystem in hybrid setting
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
History, development and trend of Fractal based biometric cryptography
by: Labu, Md Ahadullah, et al.
Published: (2015)
by: Labu, Md Ahadullah, et al.
Published: (2015)
A new computation algorithm for a cryptosystem based on Lucas Functions
by: Othman, Mohamed, et al.
Published: (2008)
by: Othman, Mohamed, et al.
Published: (2008)
Similar Items
-
Generation and statistical analysis of chaos-based pseudorandom sequences
by: Hina, Aliyu Danladi
Published: (2019) -
Synchronization between two discrete chaotic systems for secure communications
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2016) -
Cryptanalysis of a family of 1D unimodal maps
by: Md Said, Mohamad Rushdan, et al.
Published: (2017) -
A New Trend of Pseudorandom Number Generator using Multiple Chaotic Systems
by: Saba, M. Ismail, et al.
Published: (2018) -
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)