Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security.
Ziaur RahmanIbrahim KhalilMousumi Akter SumiPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- encryption algorithm
- security problems
- encryption algorithms
- cryptographic algorithms
- advanced encryption standard
- security issues
- logistic regression
- management system
- high security
- security analysis
- security requirements
- encryption decryption
- data encryption
- information security
- maximum a posteriori
- key management
- cloud computing
- data driven
- security mechanisms
- access control
- security protocols
- location information
- block cipher
- security systems
- data security
- intrusion detection
- security policies
- digital content
- encryption scheme
- sensitive data
- particle swarm optimization
- statistical databases
- elliptic curve cryptography
- data management
- information systems