1.
Introduction to Chaos.-
2.
Chaos-based Cryptography
3.
Digitized Chaos for Pseudo-Random Number Generation in Cryptography
.-
4.
Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography
.-
5.
Chaos based hash function
.-
6.
Chaos-Based Video Encryption Algorithms
.-
7.
Cryptanalysis of chaotic ciphers
.-
8.
Lessons learnt from the cryptanalysis of chaos-based ciphers
.-
9.
Hardware Implementation of chaos based cipher: Design of embedded systems for security applications
.-
10.
Hardware implementation of chaos-secured optical communication systems
.-
11.
Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
4.
Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography
.-
5.
Chaos based hash function
.-
6.
Chaos-Based Video Encryption Algorithms
.-
7.
Cryptanalysis of chaotic ciphers
.-
8.
Lessons learnt from the cryptanalysis of chaos-based ciphers
.-
9.
Hardware Implementation of chaos based cipher: Design of embedded systems for security applications
.-
10.
Hardware implementation of chaos-secured optical communication systems
.-
11.
Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
5.
Chaos based hash function
.-
6.
Chaos-Based Video Encryption Algorithms
.-
7.
Cryptanalysis of chaotic ciphers
.-
8.
Lessons learnt from the cryptanalysis of chaos-based ciphers
.-
9.
Hardware Implementation of chaos based cipher: Design of embedded systems for security applications
.-
10.
Hardware implementation of chaos-secured optical communication systems
.-
11.
Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
.-
6.
Chaos-Based Video Encryption Algorithms
.-
7.
Cryptanalysis of chaotic ciphers
.-
8.
Lessons learnt from the cryptanalysis of chaos-based ciphers
.-
9.
Hardware Implementation of chaos based cipher: Design of embedded systems for security applications
.-
10.
Hardware implementation of chaos-secured optical communication systems
.-
11.
Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms
6.
Chaos-Based Video Encryption Algorithms
.-
7.
Cryptanalysis of chaotic ciphers
.-
8.
Lessons learnt from the cryptanalysis of chaos-based ciphers
.-
9.
Hardware Implementation of chaos based cipher: Design of embedded systems for security applications
.-
10.