2012 International Conference on ICT Convergence (ICTC) 2012
DOI: 10.1109/ictc.2012.6387119
|View full text |Cite
|
Sign up to set email alerts
|

A new digital anti-counterfeiting scheme based on chaotic cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…authentication are achieved by taking large key size and complex algorithms which are widely used in mutual authentication systems [38,39,59]. The quality of the techniques depends upon the accuracy of the algorithm and key which are given unpredictable and infeasible stream and block cipher [40,57].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…authentication are achieved by taking large key size and complex algorithms which are widely used in mutual authentication systems [38,39,59]. The quality of the techniques depends upon the accuracy of the algorithm and key which are given unpredictable and infeasible stream and block cipher [40,57].…”
Section: Discussionmentioning
confidence: 99%
“…A novel digital anticounterfeiting scheme is developed based on chaotic cryptography which supports multiple and repeated queries for authentication and intelligent identification and provided security against batch copy and database attack fraud [38]. A quantum key establishment process-based cryptography, an extension to the BB84 protocol, K05, using chaos functions with shortest key is developed for faster encryption [39].…”
Section: Literature Surveymentioning
confidence: 99%
“…Periodic switching of cryptographic keys is a different concept to boost the security of cryptographic systems in which chaotic behavior is combined with the periodic switching of keys [8]. It is represented that the running time complexity of the chosen plaintext, and a cipher text attack can be reduced to yield a simple set of linear equations [27,28]. The performance of the algorithm is measured in terms of cost, time and speed.…”
Section: Featuresmentioning
confidence: 99%
“…Anti-counterfeit got quick development in a short span of twenty years [1], because the number of proliferation of fake and inferior increase swift. Meanwhile, they try different anti-counterfeiting technologies to reduce the loss caused by fake products [2].…”
Section: Introductionmentioning
confidence: 99%