{"title":"Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms","authors":"R. Hasimoto-Beltrán, Fadi Almasalha, A. Khokhar","doi":"10.1007/978-3-642-20542-2_11","DOIUrl":"https://doi.org/10.1007/978-3-642-20542-2_11","url":null,"abstract":"","PeriodicalId":263461,"journal":{"name":"Chaos-Based Cryptography","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Implementation of Chaos Based Cipher: Design of Embedded Systems for Security Applications","authors":"C. Tanougast","doi":"10.1007/978-3-642-20542-2_9","DOIUrl":"https://doi.org/10.1007/978-3-642-20542-2_9","url":null,"abstract":"","PeriodicalId":263461,"journal":{"name":"Chaos-Based Cryptography","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127245459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography","authors":"W. Tang, Ying Liu","doi":"10.1007/978-3-642-20542-2_4","DOIUrl":"https://doi.org/10.1007/978-3-642-20542-2_4","url":null,"abstract":"","PeriodicalId":263461,"journal":{"name":"Chaos-Based Cryptography","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124528884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers","authors":"G. Álvarez, J. Amigó, David Arroyo, Shujun Li","doi":"10.1007/978-3-642-20542-2_8","DOIUrl":"https://doi.org/10.1007/978-3-642-20542-2_8","url":null,"abstract":"","PeriodicalId":263461,"journal":{"name":"Chaos-Based Cryptography","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133088092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}