Security analysis of a chaos-based random number generator for applications in cryptography.
Salih ErgünPublished in: ISCIT (2015)
Keyphrases
- security analysis
- random number generator
- encryption algorithm
- image encryption
- elliptic curve cryptography
- high security
- random number
- public key
- public key cryptography
- security requirements
- information security
- smart card
- security model
- encryption scheme
- security properties
- authentication protocol
- authentication scheme
- user authentication
- private key
- pseudorandom
- mutual authentication