Computer arithmetic, chaos and fractals
CNLS '89 Proceedings of the ninth annual international conference of the Center for Nonlinear Studies on Self-organizing, Collective, and Cooperative Phenomena in Natural and Artificial Computing Networks on Emergent computation
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Cryptanalysis of Cryptosystems Based on Remote Chaos Replication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A secret key cryptosystem by iterating a chaotic map
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT'91
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Statistics of chaotic binary sequences
IEEE Transactions on Information Theory
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
LoBa128, a Lorenz-based PRNG for wireless sensor networks
International Journal of Communication Networks and Distributed Systems
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Pseudorandom bit generation using coupled congruential generators
IEEE Transactions on Circuits and Systems II: Express Briefs
Information Sciences: an International Journal
ICAI'05/MCBC'05/AMTA'05/MCBE'05 Proceedings of the 6th WSEAS international conference on Automation & information, and 6th WSEAS international conference on mathematics and computers in biology and chemistry, and 6th WSEAS international conference on acoustics and music: theory and applications, and 6th WSEAS international conference on Mathematics and computers in business and economics
Keyed hash function based on a chaotic map
Information Sciences: an International Journal
Chaotic keystream generator using coupled NDFs with parameter perturbing
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Secure chaotic system with application to chaotic ciphers
Information Sciences: an International Journal
Suitability of chaotic iterations schemes using XORshift for security applications
Journal of Network and Computer Applications
Hi-index | 0.00 |
Chaotic cryptology is widely investigated recently. This paper reviews the progress in this area and points out some existent problems in digital chaotic ciphers. As a comprehensive solution to these problems, a novel pseudo-random bit generator based on a couple of chaotic systems called CCS-PRBG is presented. Detailed theoretical analyses show that it has perfect cryptographic properties, and can be used to construct stream ciphers with higher security than other chaotic ciphers. Some experiments are made for confirmation. Finally, several examples of stream ciphers based on digital CCS-PRBG are given, and their security is discussed.