{"id":"https://openalex.org/W7128676386","doi":"https://doi.org/10.1007/s44196-026-01181-7","title":"A Modified Chaos-Driven Enhanced Cryptographic Framework for Lightweight and Robust IoT Security in Resource-Constrained Devices","display_name":"A Modified Chaos-Driven Enhanced Cryptographic Framework for Lightweight and Robust IoT Security in Resource-Constrained Devices","publication_year":2026,"publication_date":"2026-02-13","ids":{"openalex":"https://openalex.org/W7128676386","doi":"https://doi.org/10.1007/s44196-026-01181-7"},"language":"en","primary_location":{"id":"doi:10.1007/s44196-026-01181-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44196-026-01181-7","pdf_url":null,"source":{"id":"https://openalex.org/S190680769","display_name":"International Journal of Computational Intelligence Systems","issn_l":"1875-6883","issn":["1875-6883","1875-6891"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Intelligence Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s44196-026-01181-7","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125773726","display_name":"M. Vamsikrishna","orcid":null},"institutions":[{"id":"https://openalex.org/I142809039","display_name":"Jawaharlal Nehru Technological University, Kakinada","ror":"https://ror.org/05s9t8c95","country_code":"IN","type":"education","lineage":["https://openalex.org/I142809039"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Vamsikrishna","raw_affiliation_strings":["Department of Computer Applications, School of Engineering, Aditya University, Kakinada, 533437, AP, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Applications, School of Engineering, Aditya University, Kakinada, 533437, AP, India","institution_ids":["https://openalex.org/I142809039"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125716860","display_name":"Yagyesh Godiyal","orcid":null},"institutions":[{"id":"https://openalex.org/I74885063","display_name":"Sharda University","ror":"https://ror.org/03b6ffh07","country_code":"IN","type":"education","lineage":["https://openalex.org/I74885063"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Yagyesh Godiyal","raw_affiliation_strings":["Department of Computer Science and Applications, Sharda University, Noida, UP, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Applications, Sharda University, Noida, UP, India","institution_ids":["https://openalex.org/I74885063"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125692686","display_name":"Abhishek Kumar Pandey","orcid":null},"institutions":[{"id":"https://openalex.org/I3129773123","display_name":"Bennett University","ror":"https://ror.org/00an5hx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I3129773123"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Abhishek Kumar Pandey","raw_affiliation_strings":["School of computer science engineering and technology   ,  Bennett University, Greater Noida, UP, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of computer science engineering and technology   ,  Bennett University, Greater Noida, UP, India","institution_ids":["https://openalex.org/I3129773123"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039191048","display_name":"Umesh Kumar Lilhore","orcid":"https://orcid.org/0000-0001-6073-3773"},"institutions":[{"id":"https://openalex.org/I155125381","display_name":"Galgotias University","ror":"https://ror.org/02w8ba206","country_code":"IN","type":"education","lineage":["https://openalex.org/I155125381"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Umesh Kumar Lilhore","raw_affiliation_strings":["School of Computing Science and Engineering, Galgotias University, Greater Noida, UP, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computing Science and Engineering, Galgotias University, Greater Noida, UP, India","institution_ids":["https://openalex.org/I155125381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011694017","display_name":"Sarita Simaiya","orcid":"https://orcid.org/0000-0001-7686-8496"},"institutions":[{"id":"https://openalex.org/I155125381","display_name":"Galgotias University","ror":"https://ror.org/02w8ba206","country_code":"IN","type":"education","lineage":["https://openalex.org/I155125381"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sarita Simaiya","raw_affiliation_strings":["School of Computer Applications , Galgotias University, Greater Noida, UP, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Applications , Galgotias University, Greater Noida, UP, India","institution_ids":["https://openalex.org/I155125381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082691754","display_name":"Sultan Mesfer Aldossary","orcid":"https://orcid.org/0000-0002-3233-6487"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Sultan Mesfer A. Aldossary","raw_affiliation_strings":["Department of Computer Engineering and Information, College of Engineering in Wadi Alddawasir, Prince Sattam University, Wadi Alddawasir, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering and Information, College of Engineering in Wadi Alddawasir, Prince Sattam University, Wadi Alddawasir, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046810553","display_name":"Shimaa A. Hussien","orcid":"https://orcid.org/0000-0003-1498-4197"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Shimaa A. Hussien","raw_affiliation_strings":["Electrical Engineering Department, Faculty of Engineering, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Faculty of Engineering, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108814245","display_name":"Ehab Seif Ghith","orcid":null},"institutions":[{"id":"https://openalex.org/I107720978","display_name":"Ain Shams University","ror":"https://ror.org/00cb9w016","country_code":"EG","type":"education","lineage":["https://openalex.org/I107720978"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Ehab Seif Ghith","raw_affiliation_strings":["Department of Mechatronics, Faculty of Engineering, Ain Shams University, Cairo, 11566, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mechatronics, Faculty of Engineering, Ain Shams University, Cairo, 11566, Egypt","institution_ids":["https://openalex.org/I107720978"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121089746","display_name":"Lidia Gosy Tekeste","orcid":null},"institutions":[{"id":"https://openalex.org/I86539363","display_name":"University of Asmara","ror":"https://ror.org/035rzdj42","country_code":"ER","type":"education","lineage":["https://openalex.org/I86539363"]}],"countries":["ER"],"is_corresponding":false,"raw_author_name":"Lidia Gosy Tekeste","raw_affiliation_strings":["Eritrea Institute of Technology, Mai-Nefhi College, Himbrti, Mai Nefhi, Eritrea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Eritrea Institute of Technology, Mai-Nefhi College, Himbrti, Mai Nefhi, Eritrea","institution_ids":["https://openalex.org/I86539363"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101526817","display_name":"Yogesh Kumar Sharma","orcid":"https://orcid.org/0000-0003-1934-4535"},"institutions":[{"id":"https://openalex.org/I875944469","display_name":"Koneru Lakshmaiah Education Foundation","ror":"https://ror.org/02k949197","country_code":"IN","type":"education","lineage":["https://openalex.org/I875944469"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Yogesh Kumar Sharma","raw_affiliation_strings":["Department of Computer Science & Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, 522503, Andhra Pradesh, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, 522503, Andhra Pradesh, India","institution_ids":["https://openalex.org/I875944469"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":10,"corresponding_author_ids":["https://openalex.org/A5039191048"],"corresponding_institution_ids":["https://openalex.org/I155125381"],"apc_list":{"value":1390,"currency":"GBP","value_usd":1704},"apc_paid":{"value":1390,"currency":"GBP","value_usd":1704},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.25782684,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"19","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.3765999972820282,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.3765999972820282,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.26339998841285706,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.1573999971151352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6342999935150146},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.566100001335144},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.44769999384880066},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.44699999690055847},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4180999994277954},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4108000099658966},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.36980000138282776},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.36000001430511475},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.33480000495910645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8108000159263611},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6342999935150146},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.566100001335144},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47049999237060547},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.44769999384880066},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.44699999690055847},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4180999994277954},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4108000099658966},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3950999975204468},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.36980000138282776},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.36000001430511475},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.33480000495910645},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.3255000114440918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3192000091075897},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.31470000743865967},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.31360000371932983},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.31299999356269836},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.3093999922275543},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.3084000051021576},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.30559998750686646},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.296099990606308},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2921000123023987},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.2838999927043915},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2685000002384186},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.26739999651908875},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.26589998602867126},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.2619999945163727},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.2599000036716461},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.25290000438690186},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.2526000142097473}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44196-026-01181-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44196-026-01181-7","pdf_url":null,"source":{"id":"https://openalex.org/S190680769","display_name":"International Journal of Computational Intelligence Systems","issn_l":"1875-6883","issn":["1875-6883","1875-6891"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Intelligence Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:060d7d674dba4427a2011639ad261760","is_oa":true,"landing_page_url":"https://doaj.org/article/060d7d674dba4427a2011639ad261760","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Computational Intelligence Systems, Vol 19, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44196-026-01181-7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44196-026-01181-7","pdf_url":null,"source":{"id":"https://openalex.org/S190680769","display_name":"International Journal of Computational Intelligence Systems","issn_l":"1875-6883","issn":["1875-6883","1875-6891"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Computational Intelligence Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4042269289493561,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W2549870299","https://openalex.org/W2619579631","https://openalex.org/W2985143708","https://openalex.org/W3110871108","https://openalex.org/W3127883531","https://openalex.org/W3128617854","https://openalex.org/W3164170653","https://openalex.org/W3206934362","https://openalex.org/W3217272717","https://openalex.org/W4226371509","https://openalex.org/W4284966659","https://openalex.org/W4318482422","https://openalex.org/W4321595467","https://openalex.org/W4366988385","https://openalex.org/W4387616250","https://openalex.org/W4387872076","https://openalex.org/W4391427526","https://openalex.org/W4392016994","https://openalex.org/W4392346761","https://openalex.org/W4392458867","https://openalex.org/W4392683354","https://openalex.org/W4392849229","https://openalex.org/W4393110970","https://openalex.org/W4394565174","https://openalex.org/W4396605077","https://openalex.org/W4399412006","https://openalex.org/W4399896450","https://openalex.org/W4400770612","https://openalex.org/W4401332235","https://openalex.org/W4407825368","https://openalex.org/W4411276943","https://openalex.org/W4411446615","https://openalex.org/W4411628937","https://openalex.org/W4413037649","https://openalex.org/W4413155254","https://openalex.org/W4414158806","https://openalex.org/W4414630298","https://openalex.org/W4414686144","https://openalex.org/W4415593807","https://openalex.org/W4415818174","https://openalex.org/W4415944295","https://openalex.org/W4416226343","https://openalex.org/W4416666816","https://openalex.org/W4417259442","https://openalex.org/W7081951921","https://openalex.org/W7090897708"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advances":[1],"have":[2],"been":[3],"made":[4],"towards":[5],"this":[6],"goal,":[7],"owing":[8],"to":[9,67,83,95,161,195,222,244,280],"the":[10,23,84,97,113,126,134,185,192,198,220,236,240,281,287],"explosion":[11],"of":[12,61,86,125,145,239,286],"resource-constrained":[13,173],"IoT":[14,87,264,273,288],"devices:":[15],"wearables,":[16],"smart":[17,268],"sensors":[18],"and":[19,47,49,63,118,142,153,215,232,271,278,283],"embedded":[20],"systems,":[21],"raising":[22],"need":[24],"for":[25,56,116,156,259],"efficient":[26,171],"cryptographic":[27],"primitives":[28],"that":[29,79,133,175],"offer":[30],"high":[31],"security":[32,85,163,229],"margins":[33],"while":[34],"dramatically":[35],"reducing":[36],"their":[37],"resource":[38],"needs.":[39],"Existing":[40],"algorithms":[41],"such":[42,266],"as":[43,267],"DES,":[44],"3DES,":[45],"AES":[46],"Blowfish":[48],"RSA":[50],"are":[51,136,176],"secure":[52,146],"but":[53],"too":[54],"resource-hungry":[55],"these":[57,69],"devices":[58,249],"in":[59,88,159,172,204,262],"terms":[60],"computation":[62,117],"memory.":[64],"In":[65],"order":[66,160],"overcome":[68],"drawbacks,":[70],"we":[71,206],"present":[72],"a":[73,93,179,256],"Modified":[74],"Chaos-Driven":[75],"Enhanced":[76],"Cryptographic":[77],"Framework":[78],"is":[80,92,170],"intentionally":[81],"devoted":[82],"resource-limited":[89],"settings.":[90],"It":[91],"way":[94],"improve":[96],"classic":[98],"logistic":[99],"map":[100],"by":[101,201],"sharing":[102],"entropy":[103],"from":[104],"dynamic":[105],"key":[106,120],"generation":[107],"using":[108],"smaller":[109],"seeds,":[110],"which":[111,139],"makes":[112],"load":[114],"faster":[115],"stronger":[119],"unpredictability.":[121],"The":[122,148,168],"chaotic":[123],"nature":[124,238],"sensitive":[127],"dependence":[128],"on":[129,178,247],"initial":[130],"conditions":[131],"means":[132],"keys":[135],"highly":[137],"unpredictable,":[138],"enhances":[140],"confusion":[141],"diffusion":[143],"properties":[144],"encryption.":[147],"model":[149],"uses":[150],"XOR-based":[151],"encryption":[152,182],"modular":[154],"arithmetic":[155],"nonlinear":[157],"transformations":[158],"enhance":[162],"with":[164,250],"reduced":[165],"computational":[166],"complexity.":[167],"framework":[169,221,241],"environments":[174],"based":[177],"lightweight":[180,237],"symmetric":[181],"approach.":[183],"Permuting":[184],"indices":[186],"additionally":[187],"increases":[188],"diffusion,":[189],"thereby":[190],"increasing":[191],"system\u2019s":[193],"resistance":[194],"cryptanalysis.":[196],"With":[197],"threat":[199],"posed":[200],"quantum":[202,233],"computing":[203],"mind,":[205],"incorporate":[207],"Post-Quantum":[208],"Cryptography":[209],"(PQC)":[210],"schemes":[211],"like":[212],"lattice-based":[213],"cryptography":[214],"hash-based":[216],"digital":[217],"signatures":[218],"into":[219],"future-proof":[223],"it.":[224],"This":[225,275],"hybrid":[226],"scheme":[227],"provides":[228],"against":[230],"classical":[231],"adversaries.":[234],"Additionally,":[235],"allows":[242],"it":[243,255],"run":[245],"efficiently":[246],"low-power":[248],"minimal":[251],"memory":[252],"requirements,":[253],"making":[254],"feasible":[257],"solution":[258],"wide":[260],"deployment":[261],"real-time":[263],"applications":[265],"cities,":[269],"healthcare,":[270],"industrial":[272],"systems.":[274],"ensures":[276],"scalability":[277],"adaptability":[279],"growing":[282],"diverse":[284],"needs":[285],"landscape.":[289]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-02-13T00:00:00"}
