- Chaos-based Image/Signal Encryption
- Cryptography and Data Security
- Complexity and Algorithms in Graphs
- Chaos control and synchronization
- Cellular Automata and Applications
- Cryptographic Implementations and Security
- Cloud Data Security Solutions
- Security in Wireless Sensor Networks
- Advanced Photonic Communication Systems
- Optical Network Technologies
- Maritime Navigation and Safety
- Advanced Steganography and Watermarking Techniques
- Advanced Data Storage Technologies
- Network Security and Intrusion Detection
University of Electronic Science and Technology of China
2020-2024
University of Sciences and Technology Houari Boumediene
2018
The ultimate focus of this paper is to provide a hyperchaos-based reconfigurable platform for the real-time securing communicating embedded systems interconnected in networks according Internet Things (IoT) standards. proposed platform’s Register Transfer Level (RTL) architecture entirely developed and designed from scratch using VHSIC Hardware Description Language (VHDL). original idea consists exploiting nonlinearity discretized optimized 4D Lorenz hyperchaotic system as an encryption...
Drone jamming platforms are faced with a significant constraint on bandwidth limitation compared to the broadband spectrum used by remote control radio links in view of implementing advanced techniques spread these devices. In this work, we propose hardware solution overcome drone using dual AD9361 transceiver integrated AD-FMCOMMS5-EBZ prototyping platform. The hyperchaotic generator random digital signals and custom architecture have been implemented ZC706 FPGA development board. A...
Many computer-based security services are required by modern society through cipher/decipher, authentication and integrity. Security implemented symmetric (block keystream) or asymmetric cryptographic systems. This paper describes a keystream system for the smart card information encryption using Lorenz hyperchaotic system. Hence, we propose development of pseudorandom number generator (HC-PRNG) to generate keys be used as algorithm in cards. We also analyze issue proposed terms execution...