omar_ahmed1

Omar Reyad Mohamed

Lecturer - مدرس علوم الحاسب

Faculty of science

Address: محافظة سوهاج-مدينة ناصر

1

Like

Publications Which contain the keyword: Elliptic curve cryptography Random number generator Chaotic maps Statistical testing of PRNG


Statistical analysis of the chaos-driven elliptic curve pseudo-random number generators
In this paper, after a short survey describing several known constructions recommended for generating sequences of pseudo-random numbers based on elliptic curves over finite fields of prime order, we propose a method of generating such sequences of points with algorithms driven by a chaotic map. Our construction improves randomness of the sequence generated since it combines good statistical properties of ... Read more

Image Encryption using Chaos-Driven Elliptic Curve Pseudo-Random Number Generators
Pseudo-random number sequences which using the form of elliptic curves can be generated efficiently in software or hardware by the same methods that are used for the implementation of elliptic curve (EC) public-key cryptosystems. In th is paper, we proposed a secure image encryption scheme using key sequences generated from Chaos-Driven Elliptic Curve Pseudo-random Number Generator (C-D ECPRNG). This key ... Read more

Pseudo-random sequence generation from elliptic curves over a finite field of characteristic 2
In this paper, the randomness of binary sequences generated from elliptic curves over a finite field of characteristic 2 is studied. A scheme of construction based on the Chaos-Driven Elliptic Curve Pseudo-random Number Generator (C-D ECPRNG) is proposed. The generators based of this scheme are verified by using tests from the NIST Statistical Test Suite to analyze their statistical properties. ... Read more

Image Encryption Using Koblitz’s Encoding and New Mapping Method Based on Elliptic Curve Random Number Generator
Elliptic Curve Cryptography (ECC) has attractive advantages compared to other public-key cryptosystems that motivated cryptographers for using it. ECC offers equal security for a smaller key sizes, thereby reducing processing overhead, making it ideal for small devices, key agreement protocols and digital signature applications. Images are data types that occasionally include secret information, such as faces, places and signatures. Encryption ... Read more

  • «
  • 1
  • »