2011 IEEE International Symposium of Circuits and Systems (ISCAS) 2011
DOI: 10.1109/iscas.2011.5937666
|View full text |Cite
|
Sign up to set email alerts
|

A maximal entropy digital chaotic circuit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3

Relationship

4
4

Authors

Journals

citations
Cited by 20 publications
(20 citation statements)
references
References 11 publications
0
20
0
Order By: Relevance
“…Since the output of the digital chaotic circuit [10] follows a uniform distribution, independent pairs of the chaotic output (X A ,X B ) are transformed to quadrature Gaussian random variables (X I , X Q ) via the BM transformation [9], which implements the bivariate statistical mapping (1). …”
Section: A Generalized Box-muller Transformationmentioning
confidence: 99%
“…Since the output of the digital chaotic circuit [10] follows a uniform distribution, independent pairs of the chaotic output (X A ,X B ) are transformed to quadrature Gaussian random variables (X I , X Q ) via the BM transformation [9], which implements the bivariate statistical mapping (1). …”
Section: A Generalized Box-muller Transformationmentioning
confidence: 99%
“…For digital chaotic spread spectrum systems using baseband spreading these random values are circular symmetric complex normal (quadrature Gaussian) random variables. The construction of a chaotic spread symbol modulated with 16QAM constellations can take the form 1 where T is a symbol interval, S[mT] is the m th spread symbol, M is the number of spreading chips 1 per symbols (the spread ratio, assumed to be an integer), τ is chip interval and Q[mT] is the m th 16-QAM formatted symbol of the form , where , {-3,-1,1,3}. A simulated capture of one hundred real-valued 16-QAM data symbols is shown in Figure 1.…”
Section: Extension Of Gaussian Distributed Spreading Sequences Tomentioning
confidence: 99%
“…For 16-QAM symbols, the complementary amplitudes are the same 16-QAM energy-normalized amplitudes applied to yield a constant aggregate expected energy. 1 That is, a symbol with normalized variance | | 2 is paired with an independent signal with normalized variance | ′ | 18 such that the sum of their variances is a constant 20M. The independence of the orthogonal waveforms ensures that the variance of the sum ′ is the sum of the individual variances.…”
Section: Featureless Chaotic Spread Spectrum Techniques For a 16mentioning
confidence: 99%
See 1 more Smart Citation
“…Efficient mechanisms for creating arbitrary sequence lengths measured in googols have been constructed [2], with reverse engineering attempts being a combination of prime number factoring and mixed-radix conversions using noisecorrupted samples. Secondary keying processes, such as those used in public-key encryption, and offline monitoring of the overall cyber-physical infrastructure can also be used to pinpoint and timestamp DoS or spoofing attempts, with network node entry (signal acquisition) occurring only according to known protocols.…”
Section: Ia Evaluation Of Phy-layer Encryptionmentioning
confidence: 99%