- Full text PDF available (29)
This paper provides the information how to merge channel coding with the cryptography to provide ...
Chaos functions have mainly used to develop mathematical models of non linear systems. They have attracted the attention of many mathematicians owing to their extremely sensitive nature to initial conditions and their immense applicability to problems of daily life. In this paper we investigate the utility of such functions in symmetric key cryptography for… (More)
Appendix 279 The technological and economic potential to reduce greenhouse gas (GHG) emissions is large enough to hold annual global greenhouse gas emissions to levels close to or even below those of 2000 by 2010 and even lower by 2020. Realization of these reductions requires combined actions in all sectors of the economy including adoption of… (More)
Public key encryption was first introduced by Diffie and Hellman in 1976. Since then, the Diffie-Hellman key exchange protocol has been used in developing public key systems such as Rivest-Shamir-Adleman and elliptic curve cryptography. Chaotic functions, so far, have been used for symmetric cryptography only. In this Letter we propose, for the first time,… (More)
In wireless sensor networks due to the small transmission distances involved, the computation energy along with the radio energy determines the battery life. Energy consumption of error control codes (ECCs) is a complex function of the energy consumption in computing encoding-decoding, transmitting "redundant" bits and energy saved by coding gain. This… (More)