Multiscroll hopfield neural network with extreme multistability and its application in video encryption for IIoT
Neural Networks,
Год журнала:
2024,
Номер
182, С. 106904 - 106904
Опубликована: Ноя. 17, 2024
Язык: Английский
Extreme Homogeneous and Heterogeneous Multistability in a Novel 5D Memristor-Based Chaotic System with Hidden Attractors
Fractal and Fractional,
Год журнала:
2024,
Номер
8(5), С. 266 - 266
Опубликована: Апрель 28, 2024
This
paper
proposes
a
novel
five-dimensional
(5D)
memristor-based
chaotic
system
by
introducing
flux-controlled
memristor
into
3D
with
two
stable
equilibrium
points,
and
increases
the
dimensionality
utilizing
state
feedback
control
method.
The
newly
proposed
has
line
so
corresponding
attractor
belongs
to
hidden
attractor.
By
using
typical
nonlinear
analysis
tools,
complicated
dynamical
behaviors
of
new
are
explored,
which
reveals
many
interesting
phenomena,
including
extreme
homogeneous
heterogeneous
multistabilities,
transient
transition
behavior,
offset-boosting
control.
Meanwhile,
unstable
periodic
orbits
embedded
in
were
calculated
variational
method,
pruning
rules
summarized.
Furthermore,
analog
DSP
circuit
implementation
illustrates
flexibility
memristic
system.
Finally,
active
synchronization
was
investigated,
demonstrating
important
engineering
application
values
Язык: Английский
A novel image encryption algorithm based on hyperchaotic system with cross-feedback structure and diffusive DNA coding operations
Nonlinear Dynamics,
Год журнала:
2024,
Номер
112(14), С. 12579 - 12596
Опубликована: Май 13, 2024
Язык: Английский
Protected memristive implementations of cryptographic functions
Philosophical Transactions of the Royal Society A Mathematical Physical and Engineering Sciences,
Год журнала:
2025,
Номер
383(2288)
Опубликована: Янв. 1, 2025
Memristive
technology
mitigates
the
memory
wall
issue
in
von
Neumann
architectures
by
enabling
in-memory
data
processing.
Unlike
traditional
complementary
metal-oxide
semiconductor
(CMOS)
technology,
memristors
provide
a
new
paradigm
for
implementing
cryptographic
functions
and
security
considerations.
While
prior
research
explores
side-channel
attack
vulnerabilities,
our
study
uniquely
addresses
memristor-oriented
countermeasures.
We
review
different
memristive
crossbar
configurations,
implement
four-bit
S-box
function,
analyse
hiding
masking
techniques
using
self-rectifying
passive
crossbar.
Our
findings
confirm
efficacy
of
but
highlight
limitations
masked
dual-rail
pre-charge
logic
(MDPL)
methods.
Effective
MDPL
depends
on
specific
power
consumption
conditions,
i.e.
profile
input
‘01’
‘10’
are
not
clearly
distinguishable
from
‘00’
‘11’,
which,
however,
satisfied
across
various
families.
Despite
passing
t
-tests,
xor4Sbox
with
CRS-based
failed
stochastic
approaches
owing
to
differences.
prioritizes
countermeasures,
advancing
understanding
challenges
opportunities
functions.
This
article
is
part
theme
‘Emerging
technologies
future
secure
computing
platforms’.
Язык: Английский
Reconfigurable security solution based on hopfield neural network for e-healthcare applications
Scientific Reports,
Год журнала:
2025,
Номер
15(1)
Опубликована: Фев. 15, 2025
In
the
healthcare
sector,
e-diagnosis
through
medical
images
is
essential
in
a
multi-speciality
hospital;
securing
becomes
crucial
for
preserving
an
individual's
privacy
e-healthcare
applications.
So,
this
paper
has
proposed
novel
encryption
scheme
implemented
on
reconfigurable
hardware.
Realising
image
schemes
FPGA
hardware
platforms
offers
substantial
advantages
over
software
implementations.
The
image-specific
key
and
Hopfield
Neural
Network
(HNN)
carry
out
diffusion
process
using
suggested
method.
confusion
accomplished
simultaneously
by
pseudo-random
memory
addresses
derived
via
16-bit
stream
cipher
circuit,
which
incorporates
cryptography
neural
network
dynamics
methods.
By
breaking
up
spatial
redundancy
data,
mechanism
increases
data's
resilience
against
statistical
attacks,
yielding
average
entropy
of
7.99
near
zero
correlation.
When
platform,
dual-layer
technique's
fast
processing
speed,
parallelism,
reconfigurability
are
benefits,
especially
real-time
resource-constrained
implementation
occupies
20%
total
424.71
mW
power
dissipation
Intel
Cyclone
V
FPGA.
Язык: Английский
Edge-of-Chaos Kernel and Dynamic Analysis of a Hopfield Neural Network with a Locally Active Memristor
Electronics,
Год журнала:
2025,
Номер
14(4), С. 766 - 766
Опубликована: Фев. 16, 2025
Locally
active
memristors
with
an
Edge-of-Chaos
kernel
(EOCK)
represent
a
significant
advancement
in
the
simulation
of
neuromorphic
dynamics.
However,
current
research
on
EOCK
remains
at
circuit
level,
without
further
analysis
their
feasibility.
In
this
context,
we
designed
memristor
and
installed
it
third-order
circuit,
where
showed
local
activity
stability
under
defined
voltage
inductance
parameters.
This
behavior
ensured
that
by
varying
input
inductance,
could
effectively
simulate
various
neural
activities,
including
inhibitory
postsynaptic
potential
chaotic
waveforms.
By
subsequently
integrating
into
Hopfield
network
(HNN)
framework
substituting
self-coupling
weight,
observed
rich
spectrum
dynamic
behaviors,
rare
phenomenon
antimonotonicity
bubble
bifurcation.
Finally,
used
hardware
circuits
to
realize
these
generated
phenomena,
confirming
feasibility
memristor.
introducing
HNN
studying
its
implementation,
study
provides
theoretical
insights
empirical
basis
for
developing
systems
replicate
complexity
human
brain
functions.
reference
development
application
future.
Язык: Английский
Multistability, chaos and hyperchaos in a novel 3D discrete memristive system: microcontroller implementation and cryptography
Brondelle Falonne Namekong Tatang,
Adele Armele Ngo Mouelas,
Rodrigue Andre Tchamda
и другие.
Zeitschrift für Naturforschung A,
Год журнала:
2025,
Номер
unknown
Опубликована: Апрель 21, 2025
Abstract
Discrete
nonlinear
systems
involving
memristors
have
been
extensively
studied
in
recent
years.
In
this
work,
we
combine
the
nonlinearity
of
a
discrete
memristor
with
sinusoidal
transformation
scheme
to
construct
new
3D
hyperchaotic
circuit,
which
is
useful
for
image
encryption.
Firstly,
perform
dynamical
analysis
proposed
system.
Using
analytical
and
numerical
tools,
find
that
model
exhibits
rich
complex
dynamics,
including
fixed-point
planes,
hidden
attractors,
hyperchaos,
periodicity,
multistability.
To
demonstrate
its
practical
implementation,
oscillator
integrated
into
microcontroller-based
laboratory
setup,
experimental
results
closely
match
findings.
Secondly,
sequences
generated
by
are
used
build
simple
8
×
S-box
secure
The
first
shuffle
columns
rows
original
image,
then
substituted
using
substitution
box
finally
encrypted
through
diffusion.
validate
performance
our
protocol,
conduct
standard
security
analyses,
correlation
coefficient
evaluation,
pixel
change
rate,
information
entropy,
time
complexity,
key
space
analysis.
perfect
agreement
those
literature.
Язык: Английский