Del 184
Chaos-based Cryptography
Theory, Algorithms and Applications
Häftad, Engelska, 2016
Del 354 i serien Studies in Computational Intelligence
1 637 kr
Beställningsvara. Skickas inom 10-15 vardagar. Fri frakt över 249 kr.
Beskrivning
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security).
Produktinformation
- Utgivningsdatum:2016-08-23
- Mått:155 x 235 x 23 mm
- Vikt:616 g
- Format:Häftad
- Språk:Engelska
- Serie:Studies in Computational Intelligence
- Antal sidor:398
- Förlag:Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
- ISBN:9783662506530
Utforska kategorier
Innehållsförteckning
- 1.Introduction to Chaos.- 2.Chaos-based Cryptography 3.Digitized Chaos for Pseudo-Random Number Generation in Cryptography .- 4.Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography .- 5.Chaos based hash function.- 6.Chaos-Based Video Encryption Algorithms .- 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 4.Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography .- 5.Chaos based hash function.- 6.Chaos-Based Video Encryption Algorithms .- 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 5.Chaos based hash function.- 6.Chaos-Based Video Encryption Algorithms .- 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms.- 6.Chaos-Based Video Encryption Algorithms .- 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 6.Chaos-Based Video Encryption Algorithms .- 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-basedciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 7.Cryptanalysis of chaotic ciphers .-8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms8.Lessons learnt from the cryptanalysis of chaos-based ciphers .- 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms 9.Hardware Implementation of chaos based cipher: Design of embedded systems for security applications .- 10.Hardware implementation of chaos-secured optical communication systems .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and MobilePlatforms .- 11.Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms.