메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images

Author keywords

Block cipher; Encryption quality; Image encryption; Security analysis

Indexed keywords

EXPERIMENTS; IMAGE ENHANCEMENT; LARGE SCALE SYSTEMS; PARAMETER ESTIMATION; VISUAL COMMUNICATION;

EID: 51749116030     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICEE.2007.4287293     Document Type: Conference Paper
Times cited : (52)

References (19)
  • 1
    • 0003508568 scopus 로고
    • National Bureau of standards, Federal Information processing standards Publication 46, US Government Printing Office, Washington, D.C
    • National Bureau of standards. "Data Encryption Standard," Federal Information processing standards Publication 46, US Government Printing Office, Washington, D.C., 1977.
    • (1977) Data Encryption Standard
  • 4
    • 51749122588 scopus 로고    scopus 로고
    • R.L. Rivest, M.J.B. Robshaw, R.Sidney, and Y.L. Yin, The RC6TM Block cipher, v. 1.1, August 20, 1998. Available at ww.rsa.com/rsalabs/ aes/.
    • R.L. Rivest, M.J.B. Robshaw, R.Sidney, and Y.L. Yin, "The RC6TM Block cipher," v. 1.1, August 20, 1998. Available at ww.rsa.com/rsalabs/ aes/.
  • 5
    • 0001826463 scopus 로고
    • RC5 Encryption Algorithm
    • Jan
    • R.L. Rivest, "RC5 Encryption Algorithm," Dr Dobbs Journal, vol. 226, pp. 146-148, Jan. 1995.
    • (1995) Dr Dobbs Journal , vol.226 , pp. 146-148
    • Rivest, R.L.1
  • 7
    • 0004102023 scopus 로고    scopus 로고
    • RSA Security, Self Evaluation Report
    • RSA Security. "The RC6 Block cipher," Self Evaluation Report.
    • The RC6 Block cipher
  • 13
  • 14
    • 85008921093 scopus 로고    scopus 로고
    • Chaos-based encryption for digital images and videos
    • chapter 4, February
    • S. Li, G. Chen and X. Zheng, "Chaos-based encryption for digital images and videos," chapter 4 in Multimedia Security Handbook, February 2004.
    • (2004) Multimedia Security Handbook
    • Li, S.1    Chen, G.2    Zheng, X.3
  • 15
    • 51749099120 scopus 로고    scopus 로고
    • An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Encryption and Decryption
    • Accepted for publication in
    • H.H. Ahmed, H.M. Kalash, and Osama S. Farag Allah, "An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Encryption and Decryption". Accepted for publication in An International Journal of Computing and Informatics, 2007.
    • (2007) An International Journal of Computing and Informatics
    • Ahmed, H.H.1    Kalash, H.M.2    Farag Allah, O.S.3
  • 17
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric image encryption scheme based on 3D chaotic Cat maps
    • Y. Mao, G. Chen and S. Lian, "A symmetric image encryption scheme based on 3D chaotic Cat maps," Chaos, Solitons and Fractals 21, pages 749-761, 2004.
    • (2004) Chaos, Solitons and Fractals , vol.21 , pp. 749-761
    • Mao, Y.1    Chen, G.2    Lian, S.3
  • 18
    • 51749090360 scopus 로고    scopus 로고
    • Business Software Alliance, Matt Blaze et al., Minimum key length for symmetric ciphers to provide adequate commercial security, available at: http://www.bsa.org/bsa/cryptologists.html
    • Business Software Alliance, Matt Blaze et al., "Minimum key length for symmetric ciphers to provide adequate commercial security," available at: http://www.bsa.org/bsa/cryptologists.html
  • 19
    • 84890522850 scopus 로고
    • Communication theory of secrecy system
    • C.E. Shannon, "Communication theory of secrecy system," Bell Syst Tech J 1949, 28:656-715.
    • (1949) Bell Syst Tech J , vol.28 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.