Entity

Time filter

Source Type


Wei P.,Chongqing University | Wei P.,Chongqing Education of College | Liao X.,Chongqing University | Wong K.-W.,City University of Hong Kong
Journal of Computers | Year: 2011

Give a survey of the important properties of Dickson polynomial D n (x,1), and prove that Dickson polynomial D n (x,1) over finite field with 2 m is a permutation polynomial if and only if n is odd. Use this fact to construct a new key agreement protocol which is secure, feasible and extensible. © 2011 ACADEMY PUBLISHER. Source


Li B.,Chongqing Education of College
Proceedings - 2010 6th International Conference on Natural Computation, ICNC 2010 | Year: 2010

Recently, a new image encryption scheme with compound chaotic sequence cipher shifting dynamically was proposed. In this Letter, the cryptosystem is analyzed and some flaws are pointed out. Then a chosen plaintext attack is described and some remedial modifications are suggested. © 2010 IEEE. Source


Wei P.,Chongqing University | Wei P.,City University of Hong Kong | Wei P.,Chongqing Education of College | Wong K.,City University of Hong Kong | Liao X.,Chongqing Education of College
Journal of Computational Information Systems | Year: 2010

A secure communication scheme based on chaotic maps is proposed. Two chaotic maps are used in this scheme, with a symbolic sequence generated by a piecewise nonlinear chaotic map the messages sequence are transformed into a real value sequence, employing the chaotic masking technique this sequence is encrypted with a chaotic sequence generated from another chaotic map. The theoretic and experience results stated that the proposed algorithm has many properties such as high speed and easy implementing and high security. So, it is suitable for practical use in the secure communication. © 2010 Binary Information Press. Source


Wei P.,Chongqing University | Wei P.,Chongqing Education of College | Ran W.,Chongqing Education of College | Huang J.,Chongqing University | Huang J.,Chongqing Education of College
Advanced Materials Research | Year: 2011

A secure communication scheme based on piecewise linear chaotic system is proposed.Two Chaotic Systems are used in this algorithm, with a symbolic sequence generated by a Chaotic System the message sequence is tracked, employing the chaotic masking technique the message for transmitted is encrypted with a binary sequence extracted from another Chaotic System. The theoretic and experience results stated that the proposed algorithm has many properties such as high speed and easy implementing and high security and it is suitable for practical use in the secure communication. © (2011) Trans Tech Publications, Switzerland. Source


Wei P.,Chongqing University | Wei P.,Chongqing Education of College | Liao X.,Chongqing University | Huang J.,Chongqing University | Huang J.,Chongqing Education of College
Journal of Computational Information Systems | Year: 2011

This paper deals with the synchronization of two coupled identical chaotic systems. Via intermittent control with periodically intervals, we can obtain the synchronization. Some sufficient conditions for the stabilization and synchronization of a large class of coupled identical chaotic systems will be derived by using Lyapunov stability theory. Compared to exiting results, some less conservative conditions are derived to guarantee the stabilization of nonlinear system. The analytical results are confirmed by numerical simulations. Copyright © 2011 Binary Information Press. Source

Discover hidden collaborations