2023
DOI: 10.1007/s11042-023-15190-7
|View full text |Cite
|
Sign up to set email alerts
|

Asymmetric Cryptosystem Based on Biological Mutation Operation in Chirp-Z Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 59 publications
0
1
0
Order By: Relevance
“…Since there is sensitivity to initial conditions for these attractors, the initial points are used as a key for the encryption-decryption method [49]. The chaotic time series is combined with some operations, such as XOR and DNA coding for the encryption application [50][51][52]. Recently the combination of encryption and compression has been a hot topic [53].…”
Section: Introductionmentioning
confidence: 99%
“…Since there is sensitivity to initial conditions for these attractors, the initial points are used as a key for the encryption-decryption method [49]. The chaotic time series is combined with some operations, such as XOR and DNA coding for the encryption application [50][51][52]. Recently the combination of encryption and compression has been a hot topic [53].…”
Section: Introductionmentioning
confidence: 99%