2020
DOI: 10.1016/j.jisa.2020.102622
|View full text |Cite
|
Sign up to set email alerts
|

A data encryption model based on intertwining logistic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…In addition, data removal or erasure is another technique applied to protect data that had not been used for a long time. A number of these techniques are described in detail in [5][6][7][8][9][10][11][12]. Furthermore, in some cases, a combination of two methods is applied to the data system in order to strengthen the data protection procedure.…”
Section: Methodsmentioning
confidence: 99%
“…In addition, data removal or erasure is another technique applied to protect data that had not been used for a long time. A number of these techniques are described in detail in [5][6][7][8][9][10][11][12]. Furthermore, in some cases, a combination of two methods is applied to the data system in order to strengthen the data protection procedure.…”
Section: Methodsmentioning
confidence: 99%
“…In order to ensure the secure storage and transmission of information in cloud computing, big data, and other new fields, there is an urgent need to research and design new cryptographic technology and theory. In recent years, chaotic cryptography, as a new encryption technology, has attracted the attention of researchers in various fields at home and abroad [ 2 , 3 , 4 ]. The two major research directions of chaotic cryptography are stream ciphers and block cipher systems based on chaos theory, and chaos synchronization-centered secure communication systems.…”
Section: Introductionmentioning
confidence: 99%
“…A logistic map is de ned as a chaotic map represents by a non-linear di erential equation with a discrete timestep obtained by iteration map function (Ausloos, 2006) . It is initially developed to predict population growth (Kendall and Fox, 1998;Lloyd, 1995) and has been used widely in the ecological model (Storch et al, 2017) , cryptography (Moysis et al, 2020) , data encryption (Huang andDing, 2020;Moysis et al, 2020;Raghuvanshi et al, 2020). The application of a logistic map in the study of COVID-19 can be found in past studies (Mora et al, 2020;Koltsova et al, 2020;Pelinovsky et al, 2020).…”
Section: Introductionmentioning
confidence: 99%