Chongqing Education of College

Chongqing, China

Chongqing Education of College

Chongqing, China

Time filter

Source Type

Wei P.,Chongqing University | Wei P.,Chongqing Education of College | Ran W.,Chongqing Education of College | Huang J.,Chongqing University | Huang J.,Chongqing Education of College
Advanced Materials Research | Year: 2011

A secure communication scheme based on piecewise linear chaotic system is proposed.Two Chaotic Systems are used in this algorithm, with a symbolic sequence generated by a Chaotic System the message sequence is tracked, employing the chaotic masking technique the message for transmitted is encrypted with a binary sequence extracted from another Chaotic System. The theoretic and experience results stated that the proposed algorithm has many properties such as high speed and easy implementing and high security and it is suitable for practical use in the secure communication. © (2011) Trans Tech Publications, Switzerland.


Wei P.,Chongqing Education of College | Yang H.,Chongqing Education of College | Hang Q.,Chongqing Education of College | Shi X.,Chongqing Education of College
Communications in Computer and Information Science | Year: 2011

A chaotic block cryptographic scheme based on Chebyschev map is proposed. With random binary sequences generated from the couple Chebyschev map with different initial condition, the plaintext block is permuted by a key-dependent shift approach and then encrypted by the classical chaotic masking technique. Simulation results show that the proposed algorithm has excellent cryptographic properties such as diffusion and confusion properties and it can resist the know-plaintext attacks and chosen-plaintext attacks. © Springer-Verlag Berlin Heidelberg 2011.


Wei P.,Chongqing University | Wei P.,Chongqing Education of College | Liao X.,Chongqing University | Huang J.,Chongqing University | Huang J.,Chongqing Education of College
Journal of Computational Information Systems | Year: 2011

This paper deals with the synchronization of two coupled identical chaotic systems. Via intermittent control with periodically intervals, we can obtain the synchronization. Some sufficient conditions for the stabilization and synchronization of a large class of coupled identical chaotic systems will be derived by using Lyapunov stability theory. Compared to exiting results, some less conservative conditions are derived to guarantee the stabilization of nonlinear system. The analytical results are confirmed by numerical simulations. Copyright © 2011 Binary Information Press.


Wei P.,Chongqing University | Wei P.,Chongqing Education of College | Liao X.,Chongqing University | Wong K.-W.,City University of Hong Kong
Journal of Computers | Year: 2011

Give a survey of the important properties of Dickson polynomial D n (x,1), and prove that Dickson polynomial D n (x,1) over finite field with 2 m is a permutation polynomial if and only if n is odd. Use this fact to construct a new key agreement protocol which is secure, feasible and extensible. © 2011 ACADEMY PUBLISHER.


Wei P.,Chongqing University | Wei P.,City University of Hong Kong | Wei P.,Chongqing Education of College | Wong K.,City University of Hong Kong | Liao X.,Chongqing Education of College
Journal of Computational Information Systems | Year: 2010

A secure communication scheme based on chaotic maps is proposed. Two chaotic maps are used in this scheme, with a symbolic sequence generated by a piecewise nonlinear chaotic map the messages sequence are transformed into a real value sequence, employing the chaotic masking technique this sequence is encrypted with a chaotic sequence generated from another chaotic map. The theoretic and experience results stated that the proposed algorithm has many properties such as high speed and easy implementing and high security. So, it is suitable for practical use in the secure communication. © 2010 Binary Information Press.


Li B.,Chongqing Education of College
Proceedings - 2010 6th International Conference on Natural Computation, ICNC 2010 | Year: 2010

Recently, a new image encryption scheme with compound chaotic sequence cipher shifting dynamically was proposed. In this Letter, the cryptosystem is analyzed and some flaws are pointed out. Then a chosen plaintext attack is described and some remedial modifications are suggested. © 2010 IEEE.

Loading Chongqing Education of College collaborators
Loading Chongqing Education of College collaborators