๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption

โœ Scribed by Santo Banerjee (editor)


Publisher
Information Science Reference
Year
2010
Tongue
English
Leaves
596
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Over the past few decades, there has been numerous research studies conducted involving the synchronization of dynamical systems with several theoretical studies and laboratory experimentations demonstrating the pivotal role for this phenomenon in secure communications. Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study.

โœฆ Table of Contents


Title Page
Copyright Page
Dedication
Editorial Advisory Board
Table of Contents
Detailed Table of Contents
Foreword
Preface
Acknowledgment
Section 1: Chaotic Dynamical Systems, Theory and Experiments
Chapter 1: Dynamical Systems and their Chaotic Properties
Chapter 2: Chaotic Dynamical Systems Associated with Tilings of RN
Chapter 3: Identification and State Observation of Uncertain Chaotic Systems Using Projectional Differential Neural Networks
Chapter 4: Simple Chaotic Electronic Circuits
Chapter 5: Experimental Evidences of Shil'nikov Chaos and Mixed-mode Oscillation in Chua Circuit
Section 2: Synchronization of Chaotic Systems
Chapter 6: Synchronization of Chaotic Oscillators
Chapter 7: Synchronization in Integer and Fractional Order Chaotic Systems
Chapter 8: Chaos Synchronization
Chapter 9: Chaotic Gyros Synchronization
Chapter 10: Importance of Chaos Synchronization on Technology and Science
Chapter 11: Synchronization of Oscillators
Chapter 12: Synchronization of Uncertain Neural Networks with performance and Mixed Time-Delays
Chapter 13: Adaptive Synchronization in Unknown Stochastic Chaotic Neural Networks with Mixed Time-Varying Delays
Chapter 14: Type-2 Fuzzy Sliding Mode Synchronization
Section 3: Cryptographic Applications
Chapter 15: Secure Transmission of Analog Information using Chaos
Chapter 16: Control-theoretical Concepts in the Design of Symmetric Cryptosystems
Chapter 17: Unmasking Optical Chaotic Cryptosystems Based on Delayed Optoelectronic Feedback
Chapter 18: Encryption of Analog and Digital signals through Synchronized Chaotic Systems
Chapter 19: Digital Information Transmission using Discrete Chaotic Signal
Chapter 20: Mathematical Treatment for Constructing a countermeasure against the one time pad attack on the Baptista Type Cryptosystem
Chapter 21: Chaos Synchronization with Genetic Engineering Algorithm for Secure Communications
Compilation of References
About the Contributors
Index


๐Ÿ“œ SIMILAR VOLUMES


Cryptography for Secure Encryption
โœ Robert G. Underwood ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This text is intended for a one-semester course in cryptography at the advanced undergraduate/Master's degree level.ย  It is suitable for students from various STEM backgrounds, including engineering, mathematics, and computer science, and may also be attractive for researchers and professio

Modern Cryptography: Applied Mathematics
โœ William Easttom ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<span>This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography

Modern Cryptography: Applied Mathematics
โœ Chuck Easttom ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› McGraw-Hill Education ๐ŸŒ English

<h4>A Practical Guide to Cryptography Principles and Security Practices</h4> <p>Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic