Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
In the last decade, chaos has emerged as a new promising candidate for cryptography because many chaos fundamental characteristics such as a broadband spectrum, ergodicity, and high sensitivity to initial conditions are directly connected... more
    • by 
    •   11  
      CommunicationDynamical SystemsInformation SecurityCryptography
    • by 
    •   2  
      Wireless CommunicationsChaotic Communications
    • by  and +2
    •   12  
      Information TheoryChaos TheoryChaotic cryptographyChaos
This paper presents the new Lorenz unlike chaotic attractor which is constructed by a three non linear first order differential equations. These equations are arranged in a three dimensional autonomous systems. The dynamic behavior of the... more
    • by 
    •   46  
      Ordinary Differential EquationsPartial Differential EquationsNumerical SimulationsSimulation (Computer Science)
    • by 
    •   12  
      Information TheoryChaos TheoryChaotic cryptographyChaos
Spreading code plays an important role in WCDMA system. Each user in a cell is separated by a unique spread code. WCDMA system generally uses PN sequence such as Walsh codes or gold codes as spread code. In this paper, the chaotic... more
    • by 
    •   4  
      Wireless CommunicationsWide-band Code Division Multiple Access (WCDMA)Communication Chaotic System CircuitChaotic Communications
    • by 
    •   12  
      Information TheoryChaos TheoryChaotic cryptographyChaos
The idea of using chaotic transformations in cryptography is explicit in the foundational papers of Shannon on secrecy systems. Although the word “chaos” was not minted till the 1970s, Shannon clearly refers to this very concept when he... more
    • by 
    •   8  
      Information TheoryChaotic cryptographyChaosSymbolic Dynamics