Improving Middle Square Method RNG Using Chaotic Map

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Middle Square Weyl Sequence RNG

In this article, we propose a new implementation of John von Neumann’s middle square random number generator (RNG). A Weyl sequence is utilized to keep the generator running through a long period.

متن کامل

A new image encryption method using chaotic map

Nowadays, using transfer information includes images has increased due to increasing use of computer demands. Chaos-based image encryption method is one of the most efficient methods which is used to hide visual information during transmission. This paper presents a new image encryption method based on Logistic and Tent chaotic maps and permutation-diffusion architecture, in which, chaotic maps...

متن کامل

A New Encryption Method Using Chaotic Logistic Map

Encryption is to rearrange the message into difference form so that the message is keep secret. The goal of encryption is to provide an easy and inexpensive means of encryption and decryption to all authorized users in possession of the appropriate key and difficult and expensive means to estimate the plain text without use of the key Nowadays the Internet becomes popular and encryption technol...

متن کامل

Chaotic Encryption Scheme Using 1-D Chaotic Map

This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function involved in the scheme. The designed schemes have been crypt analyzed for five different methods for testing its strength. Cryptanalysis has been performed for various texts using vario...

متن کامل

Encryption of Image Using Chaotic Map

The advent of internet has paved the way for transmitting more and more information over the internet in a very less time and multimedia technology is also not untouched with it. Audio, images & other multimedia are being transmitted over the internet. The traditional encryption schemes appear not to be ideal for image applications, due to some intrinsic features of images such as bulk data cap...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied Mathematics

سال: 2011

ISSN: 2152-7385,2152-7393

DOI: 10.4236/am.2011.24062