2006
DOI: 10.1103/physreve.74.046201
|View full text |Cite
|
Sign up to set email alerts
|

Public-channel cryptography based on mutual chaos pass filters

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

1
43
0

Year Published

2007
2007
2012
2012

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 64 publications
(44 citation statements)
references
References 19 publications
1
43
0
Order By: Relevance
“…In the event of τ c = τ d = τ and for a wide range of the mutual coupling strength, σ, and the strength of the self-feedback, κ, the stationary solution is isochronal synchronization [2,5,9]. The quantity with which we measure the degree of synchronization between the two lasers is the timedependent cross correlation, ρ, defined as…”
mentioning
confidence: 99%
See 3 more Smart Citations
“…In the event of τ c = τ d = τ and for a wide range of the mutual coupling strength, σ, and the strength of the self-feedback, κ, the stationary solution is isochronal synchronization [2,5,9]. The quantity with which we measure the degree of synchronization between the two lasers is the timedependent cross correlation, ρ, defined as…”
mentioning
confidence: 99%
“…Two coupled semiconductor lasers exhibit chaos synchronization. Different coupling setups such as unidirectional or mutual coupling and variations of the strength of the self and coupling feedback result in different synchronization states: the two lasers can synchronize in a leaderlaggard or anticipated mode [3,4], as well as in two different synchronization states; achronal synchronization in which the lasers assume a fluctuating leading role, or isochronal synchronization where there is no time delay between the two lasers' chaotic signals [2,5,6,7,8].…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…The same question could be asked regarding the security of chaos cryptography [21][22][23], which is based on a similar synchronization principle [24]. Consequently, probabilistic attacks should be envisioned and tested there, too.…”
mentioning
confidence: 99%