Asian Journal of Information Technology

Year: 2012
Volume: 11
Issue: 6
Page No. 225 - 230

Performance Evaluation of Chaotic Encryption Technique

Authors : Ancy Mariam Babu and K. John Singh

References

Addison, S.R. and J.E. Gray, 2006. Chaos and encryption: Problems and potential. Proceedings of the IEEE 38th Southeastern Symposium on System Theory, March 5-7, 2006, Cookeville, TN., pp: 444-448.

Alvarez, G. and S. Li, 2006. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos, 16: 2129-2151.
Direct Link  |  

Baptista, M.S., 1998. Cryptography with chaos. Phys. Lett. A., 240: 50-54.
Direct Link  |  

Buchmann, J., 2004. Introduction to Cryptography. 2nd Edn., Springer, USA., ISBN: 978-0-387-21156-5, Pages: 335.

Chen, J., J. Zhou and W. Kwok-Wo, 2011. A modified chaos-based joint compression and encryption scheme. IEEE Trans. Circuits Syst. II: Exp. Briefs, 58: 110-114.
CrossRef  |  

Fridrich, J., 1998. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos, 8: 1259-1284.
CrossRef  |  

Hermassi, H., R. Rhouma and S. Belghith, 2010. Joint compression and encryption using chaotically mutated Huffman trees. Communi. Nonlinear Sci. Numer. Simul., 15: 2987-2999.
CrossRef  |  

Kocarev, L., G. Jakimoski, T. Stojanovski and U. Parlitz, 1998. From chaotic maps to encryption schemes. Proceedings of the IEEE International Symposium on Circuits and Systems, May 31-Jun-3, 1998, Monterey, CA., pp: 514-517.

Mace, F., F.X. Standaert and J.J. Quisquarter, 2008. FPGA implementation(s) of a scalable encryption algorithm. IEEE Trans. Very Large Scale Integr. VLSI Syst., 16: 212-216.
CrossRef  |  

Shujun, L., X. Zheng, X. Mou and Y. Cai, 2002. Chaotic encryption scheme for Real-time digital video. Proceedings of the SPIE Real-Time Imaging, March 4, 2002, Nasser Kehtarnavaz, pp: 149-160.

Wei, J., X. Liao, W. Kwok-Wo and T. Xiang, 2006. A new chaotic cryptosystem. Chaos, Solitons Fractals, 30: 1143-1152.
CrossRef  |  

Wong, K.W. and C.H. Yuen, 2008. Performing compression and encryption simultaneously using chaotic map. Computer and Information Science.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved