Advanced Search
Volume 26 Issue 9
Sep.  2004
Turn off MathJax
Article Contents
Xu Guo-Yu, Chen Xing-Yuan, Du Xue-Hui. An Authentication Scheme Using Hierarchical Identity Based Signature in Large-scale Delay Tolerant Networks[J]. Journal of Electronics & Information Technology, 2013, 35(11): 2615-2622. doi: 10.3724/SP.J.1146.2012.01735
Citation: Xie Kun, Lei Min, Feng Zheng-jin. A New Method for Improving the Encryption Property of the Chaotic System[J]. Journal of Electronics & Information Technology, 2004, 26(9): 1401-1406.

A New Method for Improving the Encryption Property of the Chaotic System

  • Received Date: 2003-05-09
  • Rev Recd Date: 2003-08-04
  • Publish Date: 2004-09-19
  • In this paper, the encryption property of the chaotic system in terms of the techniques developed in the analysis of chaotic time series is studied. Then, the typical Lorenz system is analyzed. It is found that the larger sampling interval is of huge help for improving the encryption property. The VWK(Volterra-Wiener-Korengerg) method is used to analyze and test. Finally, simulation on the computer gets the same result.
  • [1] Yang T, Yang L B, Yang C M. Cryptanalyzing chaotic secure communications using return maps[J].Physics Letters A.1998, 245:495-510
  • Cited by

    Periodical cited type(3)

    1. 夏逸珉,许春根,窦本年. 一种标准模型下基于身份的匿名加密方案. 信息网络安全. 2018(04): 72-78 .
    2. 徐国愚,王颖锋,马小飞,王科锋,颜若愚. 面向分级身份密码批验签的错误签名混合筛选算法. 计算机应用. 2017(01): 217-221 .
    3. 徐磊,许春根,窦本年. 非对称双线性对下的基于身份的加密方案. 通信技术. 2014(08): 941-945 .

    Other cited types(4)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2371) PDF downloads(658) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return