Zobrazeno 1 - 10
of 111
pro vyhledávání: '"Safwan El Assad"'
Publikováno v:
IEEE Access, Vol 10, Pp 21821-21835 (2022)
versatile video coding (VVC) is the next generation video coding standard developed by the joint video experts team (JVET) and released in July 2020. VVC introduces several new coding tools providing a significant coding gain over the high efficiency
Externí odkaz:
https://doaj.org/article/3ab2ad16b39f4c4d871166ade5cc5c85
Design, Hardware Implementation on FPGA and Performance Analysis of Three Chaos-Based Stream Ciphers
Publikováno v:
Fractal and Fractional, Vol 7, Iss 2, p 197 (2023)
In this paper, we come up with three secure chaos-based stream ciphers, implemented on an FPGA board, for data confidentiality and integrity. To do so, first, we performed the statistical security and hardware metrics of certain discrete chaotic map
Externí odkaz:
https://doaj.org/article/0ababf13378d4eb3a612337d73157fa2
Publikováno v:
Applied Sciences, Vol 12, Iss 19, p 9952 (2022)
This work proposes a new secure chaos-based encryption/decryption system, operating in cipher block chaining (CBC) mode, and analyze its performance. The cryptosystem includes a robust pseudorandom number generator of chaotic sequences (PRNG-CS). A s
Externí odkaz:
https://doaj.org/article/18809613c32847d396b7b55e4f6fac0f
Publikováno v:
Applied Sciences, Vol 12, Iss 5, p 2588 (2022)
Nowadays, mankind is living in a cyber world [...]
Externí odkaz:
https://doaj.org/article/e0b102919f2f45ec918818438b41e407
Autor:
Nabil Abdoun, Safwan El Assad, Thang Manh Hoang, Olivier Deforges, Rima Assaf, Mohamad Khalil
Publikováno v:
Symmetry, Vol 13, Iss 12, p 2432 (2021)
In this paper, we propose, implement and analyze an Authenticated Encryption with Associated Data Scheme (AEADS) based on the Modified Duplex Construction (MDC) that contains a chaotic compression function (CCF) based on our chaotic neural network re
Externí odkaz:
https://doaj.org/article/7943ac45a6e64d3a81f4daeae1bdd024
Publikováno v:
Applied Sciences, Vol 11, Iss 2, p 625 (2021)
In this study, with an FPGA-board using VHDL, we designed a secure chaos-based stream cipher (SCbSC), and we evaluated its hardware implementation performance in terms of computational complexity and its security. The fundamental element of the syste
Externí odkaz:
https://doaj.org/article/02e4f5dd2fa84cdfa01431cd4e2e79e5
Autor:
Nabil Abdoun, Safwan El Assad, Thang Manh Hoang, Olivier Deforges, Rima Assaf, Mohamad Khalil
Publikováno v:
Entropy, Vol 22, Iss 9, p 1012 (2020)
In this paper, we propose, implement, and analyze the structures of two keyed hash functions using the Chaotic Neural Network (CNN). These structures are based on Sponge construction, and they produce two variants of hash value lengths, i.e., 256 and
Externí odkaz:
https://doaj.org/article/1d86a04c5d4b4850b8ece5522da1e227
Autor:
Mohammed Abu Taha, Wassim Hamidouche, Naty Sidaty, Marko Viitanen, Jarno Vanne, Safwan El Assad, Olivier Deforges
Publikováno v:
Cryptography, Vol 4, Iss 2, p 18 (2020)
Video protection and access control have gathered steam over recent years. However, the most common methods encrypt the whole video bit stream as unique data without taking into account the structure of the compressed video. These full encryption sol
Externí odkaz:
https://doaj.org/article/8402ecab96a44e43941689463299d4f5
Autor:
Thang Manh Hoang, Safwan El Assad
Publikováno v:
Entropy, Vol 22, Iss 5, p 548 (2020)
Most of chaos-based cryptosystems utilize stationary dynamics of chaos for the permutation and diffusion, and many of those are successfully attacked. In this paper, novel models of the image permutation and diffusion are proposed, in which chaotic m
Externí odkaz:
https://doaj.org/article/052b93ae49664d32959292399d6a1141
Autor:
Dalia Battikh, Safwan El Assad, Thang Manh Hoang, Bassem Bakhache, Olivier Deforges, Mohamad Khalil
Publikováno v:
Entropy, Vol 21, Iss 8, p 748 (2019)
In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is presen
Externí odkaz:
https://doaj.org/article/7114749f39394f8eafd163c00e7704c2