Search
Now showing items 1-10 of 24
Enhancing protection techniques of e-banking security services using open source cryptographic algorithms
(IEEE, 2013-07)
Security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long time ...
Open Source Cryptographic Algorithm to Better Secure E-Banking Services and Enhance its Protection Techniques
(ResearchGate, 2013-07)
The security and the privacy features concerning e-banking needs to be improved rapidly to continue its growing. It is really difficult to ensure enough adequate security by using the conventional algorithms for a long ...
An Image Encryption Scheme based on Hybridizing Digital Chaos and Finite State Machine
(Elsevier, 2019-11)
Image encryption protects visual information by transforming images into an incomprehensible form. Chaotic systems are used to design image ciphers due to properties such as ergodicity and initial condition sensitivity. A ...
A new hybrid digital chaotic system with applications in image encryption
(Elsevier, 2019-07)
Image encryption provides confidentiality to images by transforming them into unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to design image ciphers due to its many desirable properties ...
Implementation and practical problems of chaos-based cryptography revisited
(Elsevier, 2020-02)
Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional ...
A chaos-based keyed hash function based on fixed point representation
(Springer, 2019-05)
Chaotic maps are used in the design of hash functions due to their characteristics that are analogous to cryptographic requirements. However, these maps are commonly implemented using floating point representation which ...
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
(Springer Netherlands, 2020)
Chaotic maps have various properties that mirror the security requirements of cryptographic algorithms. As such, researchers have utilized them in the design of algorithms such as hash functions. Although there exist a ...
Enhancing unimodal digital chaotic maps through hybridisation
(Springer Netherlands, 2019-04)
Despite sharing many similar properties with cryptography, digitizing chaotic maps for the purpose of developing chaos-based cryptosystems leads to dynamical degradation, causing many security issues. This paper introduces ...
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
(IEEE Access, 2021)
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims. We address this problem by proposing a hash function based on a ...
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata
(IEEE Access, 2020-07)
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward ...