2017
DOI: 10.1016/j.aeue.2017.05.047
|View full text |Cite
|
Sign up to set email alerts
|

Generalized fractional logistic map encryption system based on FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 83 publications
(25 citation statements)
references
References 20 publications
0
23
0
1
Order By: Relevance
“…Regarding to the DSP cells used, the proposed solution needs a higher quantity than others, as in [31] and [33]. However, it is also at the expense of reducing other parameters.…”
Section: Comparison With Other Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding to the DSP cells used, the proposed solution needs a higher quantity than others, as in [31] and [33]. However, it is also at the expense of reducing other parameters.…”
Section: Comparison With Other Solutionsmentioning
confidence: 99%
“…For example in both solutions Encryption_rate is lower than this work. Moreover, in [33] the complete state is taken as output and the key size is only 60 bits, which disminishes the security achieved by this solution.…”
Section: Comparison With Other Solutionsmentioning
confidence: 99%
“…In this work, we are interested in attacks related to the biometric model. FPGA circuits are preferred circuits for implementing cryptographic algorithms in relation to software implementations, in terms of security . The security of a cryptosystem is usually based on the secret key of the encryption key generator.…”
Section: Securing Fingerprint Biometric Templatesmentioning
confidence: 99%
“…Na comparação com outros trabalhos da literatura (Sreenath e Narayanan, 2018; Khani e Ahmadi, 2013), foi possível reduzir em 50% o número de elementos digitais por bit. Com essa redução, abre-se espaço para implementação em linguagem de descrição de hardware (VHDL, por exemplo) como já tem sido feito em outros trabalhos (Silva et al, 2017;Muthuswamy e Banerjee, 2015;Ismail et al, 2017). E apresentado também uma metodologia de perturbação de sistema muito simples, baseada na alteração do bit menos significativo do sistema, capaz de diminuir a degradação do caos.…”
Section: Introductionunclassified