2017
DOI: 10.1504/ijitst.2017.087131
|View full text |Cite
|
Sign up to set email alerts
|

Design and efficient implementation of a chaos-based stream cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 0 publications
0
19
0
Order By: Relevance
“…In HEVC, an adaptive scanning method of TCs is utilized for the block of sizes of 4 × 4 and 8 × 8 to gain from the statistical distribution of the active coefficients in 2-D transform blocks. For modes (6)(7)(8)(9)(10)(11)(12)(13)(14), vertical scan is used, horizontal scan for modes (22)(23)(24)(25)(26)(27)(28)(29)(30), and diagonal scan for the rest of the modes. The chroma IPMs are derived from the luma IPMs if the Derived flag is set to 1.…”
Section: Intra Prediction Modesmentioning
confidence: 99%
See 3 more Smart Citations
“…In HEVC, an adaptive scanning method of TCs is utilized for the block of sizes of 4 × 4 and 8 × 8 to gain from the statistical distribution of the active coefficients in 2-D transform blocks. For modes (6)(7)(8)(9)(10)(11)(12)(13)(14), vertical scan is used, horizontal scan for modes (22)(23)(24)(25)(26)(27)(28)(29)(30), and diagonal scan for the rest of the modes. The chroma IPMs are derived from the luma IPMs if the Derived flag is set to 1.…”
Section: Intra Prediction Modesmentioning
confidence: 99%
“…For a particular syntax element, the key-stream generator will generate the required key streams needed to get the ciphering data. The key stream generator is fostered from our previous work [10,11]. The internal state, which involves the main cryptographic complexity of the system, is consists by two third-order recursive filters.…”
Section: Encryption System Based On Chaosmentioning
confidence: 99%
See 2 more Smart Citations
“…We use an enhanced version (fast and secure) of our chaotic generator (without delays) published in El Assad and Noura patent [15]. It should be noted that the proposed joint selective encryption can be used with any secure and fast classical or chaosbased generator to obtain similar results [16,17]. Indeed, to the best of our knowledge, practically, most chaotic generators of the literature, in which they combine two chaotic maps are robust against statistical and known attacks.…”
Section: Robust and Fast Chaotic Generatormentioning
confidence: 99%