2021
DOI: 10.1007/s10772-021-09821-3
|View full text |Cite
|
Sign up to set email alerts
|

Multiuser wireless speech encryption using synchronized chaotic systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…The security analysis demonstrates the vulnerability of secret keys and the need for a large key space to withstand a brute-force attack. Strong diffusion and confusion processes have increased the battery life of the transmitter [17].…”
Section: Related Workmentioning
confidence: 99%
“…The security analysis demonstrates the vulnerability of secret keys and the need for a large key space to withstand a brute-force attack. Strong diffusion and confusion processes have increased the battery life of the transmitter [17].…”
Section: Related Workmentioning
confidence: 99%
“…From that moment on, several applications associated with chaotic systems have emerged. Some of those are in the areas of neurosystems [6,7], chemical reactions [8,9], secure communications [10][11][12][13][14][15][16][17][18], turbines [19,20], robotics [21][22][23][24], cryptosystems [25][26][27][28][29], medicine [30][31][32][33], lasers [25,34], among others.…”
Section: Introductionmentioning
confidence: 99%