Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Hong Sze Kwok"'
Publikováno v:
International Journal of Bifurcation and Chaos. 18:851-867
Random number generators are widely used in different applications. However, it is difficult to obtain a good random number generator in low precision and resource constrained system, such as an eight-bit micro-controller system which is still common
Autor:
Hong Sze Kwok, Wallace K. S. Tang
Publikováno v:
Chaos, Solitons & Fractals. 32:1518-1529
In this paper, a fast chaos-based image encryption system with stream cipher structure is proposed. In order to achieve a fast throughput and facilitate hardware realization, 32-bit precision representation with fixed point arithmetic is assumed. The
Autor:
Hong Sze Kwok, Wallace K. S. Tang
Publikováno v:
International Journal of Bifurcation and Chaos. 15:4043-4050
In this paper, a chaos-based cryptographic hash function is proposed for message authentication where a fixed length message digest can be generated from any messages with arbitrary length. The compression function in-use is developed according to th
Autor:
Hong Sze Kwok, Wallace K. S. Tang
Publikováno v:
International Journal of Bifurcation and Chaos. 14:1405-1411
In this paper, a neuron is introduced for chaotifying nonchaotic discrete-time systems with arbitrary dimensions. By modeling the neuron with a hyperbolic tangent activation function, a scalar feedback signal expressed in a linear combination of the
Publikováno v:
International Journal of Bifurcation and Chaos. 14:285-292
In this paper, an online chatting system with an embedded real-time chaotic encryption/decryption method is designed for the Internet. Such system not only provides a real-time communication platform, but also ensures a secure channel for communicati
Publikováno v:
IFAC Proceedings Volumes. 34:176-180
A secure digital communication system based on chaotic theory is proposed to fence off the intrusion of eavesdroppers during the transmission of signal and data. With the master-slave M-synchronization technique, the transmitter and the receiver are
Publikováno v:
2005 IEEE International Conference on Industrial Technology.
In this paper, a novel chaos-based message authentication coding scheme is proposed for remote monitoring applications. With the use of high-dimensional chaotic map, a keyed hash function is constructed so that authentication code of any arbitrary me
Publikováno v:
IEEE 2002 28th Annual Conference of the Industrial Electronics Society. IECON 02.
An approach of nonlinear feedback control for generating chaos in third-order linear autonomous continuous-time systems is proposed. With a simple nonlinear feedback control, chaotic dynamics can be generated in the controlled systems. The nonlineari
Publikováno v:
IEEE 2002 28th Annual Conference of the Industrial Electronics Society. IECON 02; 2002, p01-vi-vi, 1p
Publikováno v:
IEEE 2002 28th Annual Conference of the Industrial Electronics Society. IECON 02; 2002, p01-xlii-xlii, 1p