1.
\nIntroduction to Chaos.-
\n2.
\nChaos-based Cryptography
\n3.
\nDigitized Chaos for Pseudo-Random Number Generation in Cryptography
\n.-
\n4.
\nFormation of High-Dimensional Chaotic Maps and Their Uses in Cryptography
\n.-
\n5.
\nChaos based hash function
\n.-
\n6.
\nChaos-Based Video Encryption Algorithms
\n.-
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.
\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n4.
\nFormation of High-Dimensional Chaotic Maps and Their Uses in Cryptography
\n.-
\n5.
\nChaos based hash function
\n.-
\n6.
\nChaos-Based Video Encryption Algorithms
\n.-
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n5.
\nChaos based hash function
\n.-
\n6.
\nChaos-Based Video Encryption Algorithms
\n.-
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.
\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n.-
\n6.
\nChaos-Based Video Encryption Algorithms
\n.-
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.
\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n6.
\nChaos-Based Video Encryption Algorithms
\n.-
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.
\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.
\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n8.\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile
\n schovat popis- Nakladatel: Springer, Berlin
- Kód:
- Rok vydání: 2016
- Jazyk: Angličtina
- Vazba: Měkká
- Počet stran: 398
- Šířka balení: 15.5 cm
- Výška balení: 23.5 cm
Recenze