Search scope:
排序: Display mode:
Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system Research Articles
Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan,stkingni@gmail.com
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.1900167
Keywords: 混沌系统;霍普夫分岔;共存吸引子;偏置增强;FPGA实现;声音加密
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7, Pages 940-956 doi: 10.1631/FITEE.2000071
Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗
Bifurcation-based fractional-order PI None
Karima RABAH, Samir LADACI, Mohamed LASHAB
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2, Pages 180-191 doi: 10.1631/FITEE.1601543
Keywords: Fractional order system Bifurcation diagram Fractional PIλDμ controller Multi-scroll Chen chaotic system Genesio-Tesi chaotic system
Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation None
Rodrigo MÉNDEZ-RAMÍREZ, Adrian ARELLANO-DELGADO, César CRUZ-HERNÁNDEZ, Fausto ABUNDIZ-PÉREZ, Rigoberto MARTÍNEZ-CLARK
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2, Pages 165-179 doi: 10.1631/FITEE.1601346
Keywords: Chaotic systems Statistical tests Embedded systems dsPIC microcontroller Serial peripheral interface (SPI) protocol
Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA Personal View
Vijay DAHIPHALE, Gaurav BANSOD, Ankur ZAMBARE, Narayan PISHAROTY
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 4, Pages 615-628 doi: 10.1631/FITEE.1800681
Keywords: Lightweight cryptography Internet of Things (IoT) Embedded security Encryption FPGA Datapath design
Cellular automata based multi-bit stuck-at fault diagnosis for resistive memory Research Article
Sutapa SARKAR, Biplab Kumar SIKDAR, Mousumi SAHA
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 7, Pages 1110-1126 doi: 10.1631/FITEE.2100255
Keywords: Resistive memory Cell reliability Stuck-at fault diagnosis Single-length-cycle single-attractor cellular automata Single-length-cycle two-attractor cellular automata Single-length-cycle multiple-attractor cellular automata
A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations Research Articles
Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.1900709
Keywords: 分数阶离散系统;神经网络;DNA加密;彩色图像加密
Optimal one-bit perturbation in Boolean networks based on cascading aggregation Research Articles
Jin-feng PAN, Min MENG
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 2, Pages 294-303 doi: 10.1631/FITEE.1900411
Keywords: Large-scale Boolean network Attractor Cascading aggregation One-bit perturbation
Wu Yong,Zhang Guanglie,Zheng Nanning,Zhang Xia
Strategic Study of CAE 2001, Volume 3, Issue 4, Pages 56-62
Keywords: scan format conversion frame rate up-conversion block-matching motion compensation
Implementation of PRINCE with resource-efficient structures based on FPGAs Research Articles
Lang Li, Jingya Feng, Botao Liu, Ying Guo, Qiuping Li,lilang911@126.com,fengjyk@126.com
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 11, Pages 1505-1516 doi: 10.1631/FITEE.2000688
Keywords: 轻量级分组密码;现场可编程门阵列(FPGA);低成本;PRINCE;嵌入式安全
BORON: an ultra-lightweight and low power encryption design for pervasive computing Article
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3, Pages 317-331 doi: 10.1631/FITEE.1500415
Keywords: Lightweight cryptography SP network Block cipher Internet of Things (IoT) Encryption Embedded security
An Approximate Analytical Method for a Slot Ring Radome Article
Kang Luo, Jin Meng, Jiangfeng Han, Danni Zhu
Engineering 2023, Volume 30, Issue 11, Pages 75-82 doi: 10.1016/j.eng.2023.07.015
In this paper, an in-band and out-of-band microwave wireless power-transmission characteristic analysis of a slot ring radome based on an approximate analytical method is proposed. The main contribution of this paper is that, in the approximate analysis of the ring radome, a unified expression of the incident field on the radome surface is derived with E-plane and H-plane scanning, and the ring is approximated as 30 segments of straight strips. Solving the corresponding 60 × 60 linear equations yields the electric current distribution along the ring strip. The magnetic current along the complementary slot ring is obtained by duality. Thanks to the fully analytical format of the current distribution, the microwave wireless power-transmission characteristics are efficiently calculated using Munk's scheme. An example of a slot ring biplanar symmetric hybrid radome is used to verify the accuracy and efficiency of the proposed scheme. The central processing unit (CPU) time is about 690 s using Ansys HFSS software versus 2.82 s for the proposed method.
Keywords: Approximate analytical Ring Radome Kirchhoff-type circuit
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Strategic Study of CAE 2000, Volume 2, Issue 2, Pages 41-46
The conception of the generating lock P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XA≠XB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.
Keywords:
the generating lock
the central encrypting system
multi-tooth encrypting-decrypting algorithm
P
Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 9, Pages 1180-1190 doi: 10.1631/FITEE.1601814
In this study, a new controller for chaos synchronization is proposed. It consists of a state feedback controller and a robust control term using Legendre polynomials to compensate for uncertainties. The truncation error is also considered. Due to the orthogonal functions theorem, Legendre polynomials can approximate nonlinear functions with arbitrarily small approximation errors. As a result, they can replace fuzzy systems and neural networks to estimate and compensate for uncertainties in control systems. Legendre polynomials have fewer tuning parameters than fuzzy systems and neural networks. Thus, their tuning process is simpler. Similar to the parameters of fuzzy systems, Legendre coefficients are estimated online using the adaptation rule obtained from the stability analysis. It is assumed that the master and slave systems are the Lorenz and Chen chaotic systems, respectively. In secure communication systems, observer-based synchronization is required since only one state variable of the master system is sent through the channel. The use of observer-based synchronization to obtain other state variables is discussed. Simulation results reveal the effectiveness of the proposed approach. A comparison with a fuzzy sliding mode controller shows that the proposed controller provides a superior transient response. The problem of secure communications is explained and the controller performance in secure communications is examined.
Keywords: Observer-based synchronization Chaotic systems Legendre polynomials Secure communications
Parameter value selection strategy for complete coverage path planning based on the Lü system to perform specific types of missions Research Article
Caihong LI, Cong LIU, Yong SONG, Zhenying LIANG
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 2, Pages 231-244 doi: 10.1631/FITEE.2200211
Keywords: Chaotic mobile robot Lü system Complete coverage path planning (CCPP) Parameter value selection strategy Lyapunov exponent Pearson correlation coefficient
Title Author Date Type Operation
Dynamic analysis, FPGA implementation, and cryptographic application of an autonomous 5D chaotic system
Sifeu Takougang Kingni, Karthikeyan Rajagopal, Serdar Çiçek, Ashokkumar Srinivasan, Anitha Karthikeyan,stkingni@gmail.com
Journal Article
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Journal Article
Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation
Rodrigo MÉNDEZ-RAMÍREZ, Adrian ARELLANO-DELGADO, César CRUZ-HERNÁNDEZ, Fausto ABUNDIZ-PÉREZ, Rigoberto MARTÍNEZ-CLARK
Journal Article
Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA
Vijay DAHIPHALE, Gaurav BANSOD, Ankur ZAMBARE, Narayan PISHAROTY
Journal Article
Cellular automata based multi-bit stuck-at fault diagnosis for resistive memory
Sutapa SARKAR, Biplab Kumar SIKDAR, Mousumi SAHA
Journal Article
A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations
Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com
Journal Article
Optimal one-bit perturbation in Boolean networks based on cascading aggregation
Jin-feng PAN, Min MENG
Journal Article
A New Adaptive Frame Rate Upconversion Algorithm for Scan Rate Conversion and Its FPGA Implementation
Wu Yong,Zhang Guanglie,Zheng Nanning,Zhang Xia
Journal Article
Implementation of PRINCE with resource-efficient structures based on FPGAs
Lang Li, Jingya Feng, Botao Liu, Ying Guo, Qiuping Li,lilang911@126.com,fengjyk@126.com
Journal Article
BORON: an ultra-lightweight and low power encryption design for pervasive computing
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Journal Article
An Approximate Analytical Method for a Slot Ring Radome
Kang Luo, Jin Meng, Jiangfeng Han, Danni Zhu
Journal Article
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Journal Article
Synchronization of two different chaotic systems using Legendre polynomials with applications in secure communications
Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI
Journal Article