scispace - formally typeset
Search or ask a question
Author

Zhong Li

Other affiliations: Yonsei University
Bio: Zhong Li is an academic researcher from Rolf C. Hagen Group. The author has contributed to research in topics: Chaotic & Stream cipher. The author has an hindex of 15, co-authored 36 publications receiving 842 citations. Previous affiliations of Zhong Li include Yonsei University.

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the dynamic characteristics of a permanent magnet synchronous motor (PMSM) were analyzed and the steady-state characteristics of the system, subject to constant input voltage and constant external torque, were formulated.
Abstract: This brief studies dynamic characteristics of a permanent-magnet synchronous motor (PMSM). The mathematical model of the PMSM is first derived, which is fit for carrying out the bifurcation and chaos analysis. Then, the steady-state characteristics of the system, when subject to constant input voltage and constant external torque, are formulated. Three cases are discussed and, for each case, conditions are derived under which the dynamic characteristics of the system are either of steady-state type, limit cycles or chaotic, thus by properly adjusting some system parameters, the system can exhibit limit cycles (LCs) or chaotic behaviors at will. Finally, computer simulations are presented to verify the existence of strange attractors in the PMSM.

289 citations

Journal ArticleDOI
TL;DR: An approach to generate multiple pseudorandom-bit sequences from a single spatiotemporal chaotic system is proposed and it is observed from simulation results that the CML–MPRBG has good cryptographic properties.

86 citations

Journal ArticleDOI
TL;DR: Numerical investigation shows that the cryptographic properties of the generated keystream are satisfactory, and the cipher seems to have higher security, higher efficiency and lower computation expense than the stream cipher based on a spatiotemporal chaotic system proposed recently.
Abstract: A stream cipher based on a spatiotemporal chaotic system is proposed. A one-way coupled map lattice consisting of logistic maps is served as the spatiotemporal chaotic system. Multiple keystreams are generated from the coupled map lattice by using simple algebraic computations, and then are used to encrypt plaintext via bitwise XOR. These make the cipher rather simple and efficient. Numerical investigation shows that the cryptographic properties of the generated keystream are satisfactory. The cipher seems to have higher security, higher efficiency and lower computation expense than the stream cipher based on a spatiotemporal chaotic system proposed recently.

86 citations

Journal ArticleDOI
TL;DR: In this paper, an analogue chaotic PWM carrier is designed to be embedded in a chaotic pulse width modulation (PWM) boost converter, and to be used for reducing electromagnetic interference (EMI) in dc-dc converters.
Abstract: An analogue chaotic carrier is designed to be embedded in a chaotic pulse width modulation (PWM) boost converter, and to be used for reducing electromagnetic interference (EMI) in dc-dc converters. The analogue chaotic PWM has its advantages over the digital one in its low costs and easy-to-design, making it suitable for high-frequency operation and situations when design flexibility and low cost are required. Finally, simulations and experiments are conducted to illustrate the effectiveness of the proposed analogue chaotic PWM in reducing EMI.

70 citations

Journal ArticleDOI
TL;DR: This approach is proven to be mathematically rigorous for anticontrol of chaos for a TS fuzzy system, in the sense that any given discrete-time Takagi-Sugeno fuzzy system can be made chaotic by the designed PDC controller along with the mod-operation.
Abstract: In this paper, a simple and systematic control design method is proposed for a discrete-time Takagi-Sugeno (TS) fuzzy system, which employs the parallel distributed compensation (PDC) to determine the structure of a fuzzy controller so as to make all the Lyapunov exponents of the controlled TS fuzzy system strictly positive. This approach is proven to be mathematically rigorous for anticontrol of chaos for a TS fuzzy system, in the sense that any given discrete-time TS fuzzy system can be made chaotic by the designed PDC controller along with the mod-operation. A numerical example is included to visualize the anticontrol effect.

41 citations


Cited by
More filters
01 Jan 2002

9,314 citations

Journal ArticleDOI
01 Jan 2011
TL;DR: A fast image encryption algorithm with combined permutation and diffusion is proposed and an efficient method for generating pseudorandom numbers from spatiotemporal chaos is suggested, which further increases the encryption speed.
Abstract: In recent years, various image encryption algorithms based on the permutation-diffusion architecture have been proposed where, however, permutation and diffusion are considered as two separate stages, both requiring image-scanning to obtain pixel values. If these two stages are combined, the duplicated scanning effort can be reduced and the encryption can be accelerated. In this paper, a fast image encryption algorithm with combined permutation and diffusion is proposed. First, the image is partitioned into blocks of pixels. Then, spatiotemporal chaos is employed to shuffle the blocks and, at the same time, to change the pixel values. Meanwhile, an efficient method for generating pseudorandom numbers from spatiotemporal chaos is suggested, which further increases the encryption speed. Theoretical analyses and computer simulations both confirm that the new algorithm has high security and is very fast for practical image encryption.

528 citations

Journal ArticleDOI
TL;DR: A stream-cipher algorithm based on one-time keys and robust chaotic maps, in order to get high security and improve the dynamical degradation, and is suitable for application in color image encryption.
Abstract: We designed a stream-cipher algorithm based on one-time keys and robust chaotic maps, in order to get high security and improve the dynamical degradation. We utilized the piecewise linear chaotic map as the generator of a pseudo-random key stream sequence. The initial conditions were generated by the true random number generators, the MD5 of the mouse positions. We applied the algorithm to encrypt the color image, and got the satisfactory level security by two measures: NPCR and UACI. When the collision of MD5 had been found, we combined the algorithm with the traditional cycle encryption to ensure higher security. The ciphered image is robust against noise, and makes known attack unfeasible. It is suitable for application in color image encryption.

490 citations

Proceedings ArticleDOI
13 Nov 2009
TL;DR: This paper proposes to encrypt every data block with a different key so that flexible cryptography-based access control can be achieved, and investigates the overhead and safety of the proposed approach, and study mechanisms to improve data access efficiency.
Abstract: Providing secure and efficient access to large scale outsourced data is an important component of cloud computing. In this paper, we propose a mechanism to solve this problem in owner-write-users-read applications. We propose to encrypt every data block with a different key so that flexible cryptography-based access control can be achieved. Through the adoption of key derivation methods, the owner needs to maintain only a few secrets. Analysis shows that the key derivation procedure using hash functions will introduce very limited computation overhead. We propose to use over-encryption and/or lazy revocation to prevent revoked users from getting access to updated data blocks. We design mechanisms to handle both updates to outsourced data and changes in user access rights. We investigate the overhead and safety of the proposed approach, and study mechanisms to improve data access efficiency.

321 citations