Table of Contents for: Chaos-based cryptography : theory, algor

 Staff view

You must be logged in to Tag Records

Chaos-based cryptography : theory, algorithms and applications /

Ljupco Kocarev and Shiguo Lian (Eds.).

Book Cover
Names: Kocarev, L. | Lian, Shiguo.
Published: Berlin : Springer, ©2011.
Series: Studies in computational intelligence ; v. 354.
Topics: Computer security. | Cryptography. | Ingénierie.
Genres: Electronic books.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


1. Introduction to Chaos -- 2. Chaos-based Cryptography 3. Digitized Chaos for Pseudo-Random Number Generation in Cryptography -- 4. Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography -- 5. Chaos based hash function -- 6. Chaos-Based Video Encryption Algorithms -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 4. Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography -- 5. Chaos based hash function -- 6. Chaos-Based Video Encryption Algorithms -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 5. Chaos based hash function -- 6. Chaos-Based Video Encryption Algorithms -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms -- 6. Chaos-Based Video Encryption Algorithms -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 6. Chaos-Based Video Encryption Algorithms -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 8. Lessons learnt from the cryptanalysis of chaos-based ciphers -- 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 9. Hardware Implementation of chaos based cipher: Design of embedded systems for security applications -- 10. Hardware implementation of chaos-secured optical communication systems -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms -- 11. Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms.

Table of Contents for: Chaos-based cryptography : theory, algor