AES WITH CHAOTIC USING CHEBYSHEV POLYNOMIAL
نویسندگان
چکیده
منابع مشابه
Computable Function Representations Using Effective Chebyshev Polynomial
We show that Chebyshev Polynomials are a practical representation of computable functions on the computable reals. The paper presents error estimates for common operations and demonstrates that Chebyshev Polynomial methods would be more efficient than Taylor Series methods for evaluation of transcendental functions. Keywords—Approximation Theory, Chebyshev Polynomial, Computable Functions, Comp...
متن کاملNumerical Approximations Using Chebyshev Polynomial Expansions
The aim of this work is to find numerical solutions for differential equations by expanding the unknown function in terms of Chebyshev polynomials and solving a system of linear equations directly for the values of the function at the extrema (or zeros) of the Chebyshev polynomial of order N . The solutions are exact at these points, apart from round-off computer errors and the convergence of o...
متن کاملChebyshev polynomial Kalman filter
A novel Gaussian state estimator named Chebyshev Polynomial Kalman Filter is proposed that exploits the exact and closed-form calculation of posterior moments for polynomial nonlinearities. An arbitrary nonlinear system is at first approximated via a Chebyshev polynomial series. By exploiting special properties of the Chebyshev polynomials, exact expressions for mean and variance are then provi...
متن کاملConstrained Jacobi Polynomial and Constrained Chebyshev Polynomial
In this paper, we present the constrained Jacobi polynomial which is equal to the constrained Chebyshev polynomial up to constant multiplication. For degree n = 4, 5, we find the constrained Jacobi polynomial, and for n ≥ 6, we present the normalized constrained Jacobi polynomial which is similar to the constrained Chebyshev polynomial.
متن کاملChaotic Variations of AES Algorithm
Advanced Encryption Standard (AES) algorithm is considered as a secured algorithm. Still, some security issues lie in the S-Box and the key used. In this paper, we have tried to give focus on the security of the key used. Here, the proposed modified algorithms for the AES have been simulated and tested with different chaotic variations such as 1-D logistic chaos equation, cross chaos equation a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iraqi Journal for Computers and Informatics
سال: 2018
ISSN: 2520-4912,2313-190X
DOI: 10.25195/ijci.v44i2.55