2017
DOI: 10.1088/1742-6596/936/1/012017
|View full text |Cite
|
Sign up to set email alerts
|

Generalized logistic map and its application in chaos based cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…where n is the iteration times of chaotic sequences and λ is the control parameters of the logistic mapping system. For any x 0 ∈ (0, 1), the Logistic mapping has chaotic characteristics when 3.99 < λ < 4.0 [14,15], it constitutes the pseudorandom chain we need. The double pseudo-random chain has two chaotic sequences which have different x 0 , and it has the following characteristics [16]:…”
Section: Double Pseudo-random Chainmentioning
confidence: 99%
“…where n is the iteration times of chaotic sequences and λ is the control parameters of the logistic mapping system. For any x 0 ∈ (0, 1), the Logistic mapping has chaotic characteristics when 3.99 < λ < 4.0 [14,15], it constitutes the pseudorandom chain we need. The double pseudo-random chain has two chaotic sequences which have different x 0 , and it has the following characteristics [16]:…”
Section: Double Pseudo-random Chainmentioning
confidence: 99%
“…However, as far as cryptography is concerned, both types of these functions are often the weakest points of algorithms referred to in publications. This fact results, among other factors, from: The above mentioned drawbacks have been noticed by some researchers and attempts made at determining other functions that could successfully replace logistic map (3) or skew tent map (4) [3,19]. The presented map (8) is devoid of the above-mentioned disadvantages.…”
Section: Applicationsmentioning
confidence: 99%
“…Steganography allows to hide data in such a way that their presence cannot be detected by humans [6]. Unlike steganography, cryptography transforms the output in such a way that its content is not hidden [7,8].…”
Section: Introductionmentioning
confidence: 99%