1.
\nIntroduction to Chaos.-
\n2.
\nChaos-based Cryptography
\n3.
\nDigitized Chaos for Pseudo-Random Number Generation in Cryptography
\n.-
\n4.
\nFormation of High-Dimensional Chaotic Maps and Their Uses in Cryptography
\n.-
\n5.
\nChaos based hash function
\n.-
\n6.
\nChaos-Based Video Encryption Algorithms
\n.-
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.
\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n4.
\nFormation of High-Dimensional Chaotic Maps and Their Uses in Cryptography
\n.-
\n5.
\nChaos based hash function
\n.-
\n6.
\nChaos-Based Video Encryption Algorithms
\n.-
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n5.
\nChaos based hash function
\n.-
\n6.
\nChaos-Based Video Encryption Algorithms
\n.-
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.
\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n.-
\n6.
\nChaos-Based Video Encryption Algorithms
\n.-
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.
\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n6.
\nChaos-Based Video Encryption Algorithms
\n.-
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.
\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n7.
\nCryptanalysis of chaotic ciphers
\n.-
\n8.
\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n8.\nLessons learnt from the cryptanalysis of chaos-based ciphers
\n.-
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
\n9.
\nHardware Implementation of chaos based cipher: Design of embedded systems for security applications
\n.-
\n10.
\nHardware implementation of chaos-secured optical communication systems
\n.-
\n11.
\nPerformance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile
\n ukryj opis- Wydawnictwo: Springer, Berlin
- Kod:
- Rok wydania: 2016
- Język: Angielski
- Oprawa: Miękka
- Liczba stron: 398
- Szerokość opakowania: 15.5 cm
- Wysokość opakowania: 23.5 cm
Recenzja