-
1
-
-
80455153351
-
-
National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication No. 46, U.S. Government Printing Office, Washington, DC
-
National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication No. 46, U.S. Government Printing Office, Washington, DC (1977).
-
(1977)
-
-
-
2
-
-
80455133631
-
-
National Bureau of Standards, Data Encryption Standard Modes of Operation, Federal Information Processing Standards Publication No. 81, U.S. Government Printing Office, Washington, DC
-
National Bureau of Standards, Data Encryption Standard Modes of Operation, Federal Information Processing Standards Publication No. 81, U.S. Government Printing Office, Washington, DC (1980).
-
(1980)
-
-
-
3
-
-
0001826463
-
The RC5 encryption algorithm
-
R. L. Rivest, "The RC5 encryption algorithm," Dr. Dobb's J. 226(3), 146-148 (1995).
-
(1995)
Dr. Dobb's J.
, vol.226
, Issue.3
, pp. 146-148
-
-
Rivest, R.L.1
-
4
-
-
0013017020
-
The advanced encryption standard
-
J. Daemen and V. R. Rijndael, "The advanced encryption standard," Dr. Dobb's J. 26(3), 137-139 (2001).
-
(2001)
Dr. Dobb's J.
, vol.26
, Issue.3
, pp. 137-139
-
-
Daemen, J.1
Rijndael, V.R.2
-
5
-
-
36048937251
-
Optical image encryption using fractional Fourier transform and chaos
-
N. Singh and A. Sinha, "Optical image encryption using fractional Fourier transform and chaos," Opt. Lasers Eng. 46(2), 117-123 (2007).
-
(2007)
Opt. Lasers Eng.
, vol.46
, Issue.2
, pp. 117-123
-
-
Singh, N.1
Sinha, A.2
-
6
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
DOI 10.1142/S0218127406015970, PII S0218127406015970
-
G. Alvarez and S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," Int. J. Bifurcation Chaos Appl. Sci. Eng. 16(8): 2129-2151 (2006). (Pubitemid 44671739)
-
(2006)
International Journal of Bifurcation and Chaos
, vol.16
, Issue.8
, pp. 2129-2151
-
-
Alvarez, G.1
Li, S.2
-
8
-
-
10444257964
-
A novel fast image encryption scheme based on 3D chaotic baker maps
-
DOI 10.1142/S021812740401151X, PII S021812740401151X
-
Y. B. Mao, G. Chen, and S. G. Lian, "A novel fast image encryption scheme based on the 3D chaotic baker map," Int. J. Bifurcation Chaos Appl. Sci. Eng. 14(10), 3613-3624 (2004). (Pubitemid 39638599)
-
(2004)
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
, vol.14
, Issue.10
, pp. 3613-3624
-
-
Mao, Y.1
Chen, G.2
Lian, S.3
-
9
-
-
0029368346
-
Autonomous exploration and control of chaotic systems
-
E. Bradley, "Autonomous exploration and control of chaotic systems," IEEE Trans. Syst. Man Cybern. 26(5), 499-519 (1995).
-
(1995)
IEEE Trans. Syst. Man Cybern.
, vol.26
, Issue.5
, pp. 499-519
-
-
Bradley, E.1
-
11
-
-
1342306864
-
A symmetric image encryption scheme based on 3d chaotic cat maps
-
G. Chen, Y. Mao, and C. K. Chui, "A symmetric image encryption scheme based on 3d chaotic cat maps," Chaos, Solitons Fractals 21(3), 749-761 (2004).
-
(2004)
Chaos, Solitons Fractals
, vol.21
, Issue.3
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
13
-
-
0036404061
-
Chaotic encryption scheme for real-time digital video
-
DOI 10.1117/12.458527
-
S. Li, X. Zheng, X. Mou, and Y. Cai, "Chaotic encryption scheme for real-time digital video," Proc. SPIE 4666, 149-160 (2002). (Pubitemid 35263100)
-
(2002)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4666
, pp. 149-160
-
-
Li, S.1
Zheng, X.2
Mou, X.3
Cai, Y.4
-
14
-
-
2942651203
-
Optical encryption and decryption using personal fingerprint image
-
presented at the
-
S. Lee, J. Wook Han, and D. Seo, "Optical encryption and decryption using personal fingerprint image," presented at the 6th Int. at Conf. on Advanced Communi. Technol., Vol. 1, pp. 413-415 (2004).
-
(2004)
6th Int. at Conf. on Advanced Communi. Technol.
, vol.1
, pp. 413-415
-
-
Lee, S.1
Wook Han, J.2
Seo, D.3
-
15
-
-
0003851399
-
-
C, 2nd ed., Wiley, Hoboken, NJ
-
B. Schneier, Applied Cryptography-Protocols, algorithms, and source code in C, 2nd ed., Wiley, Hoboken, NJ (1996).
-
(1996)
Applied Cryptography-Protocols, Algorithms, and Source Code
-
-
Schneier, B.1
-
16
-
-
51749116030
-
Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images
-
H. E. H. Ahmed, H. M. Kalash, and O. S. Farag Allah, "Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images," Int. J. Comput. Inf. Sys. Sci. Eng. 1(1), 33-39 (2007).
-
(2007)
Int. J. Comput. Inf. Sys. Sci. Eng.
, vol.1
, Issue.1
, pp. 33-39
-
-
Ahmed, H.E.H.1
Kalash, H.M.2
Farag Allah, O.S.3
-
17
-
-
80455133628
-
The RC6 block cipher
-
Cambridge, MA, and RSA Laboratories, San Mateo, CA
-
R. L. Fivest, M. J. B. Robshad, R. Sidney, and Y. L. Yin, "The RC6 block cipher," MIT Laboratory for Computer Science, Cambridge, MA, and RSA Laboratories, San Mateo, CA (1998).
-
(1998)
MIT Laboratory for Computer Science
-
-
Fivest, R.L.1
Robshad, M.J.B.2
Sidney, R.3
Yin, Y.L.4
-
18
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps," Int. J. Bifurcation Chaos Appl. Sci. Eng. 8(6), 1259-1284 (1998).
-
(1998)
Int. J. Bifurcation Chaos Appl. Sci. Eng.
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
19
-
-
57649135220
-
An image encryption scheme based on chaotic map
-
presented at the
-
J. Peng, S. Jin, G. Chen, Z. Yang, and X. Liao, "An image encryption scheme based on chaotic map," presented at the 4th Int. Conf. on Natural Computation, Vol. 4, pp. 595-599 (2008).
-
(2008)
4th Int. Conf. on Natural Computation
, vol.4
, pp. 595-599
-
-
Peng, J.1
Jin, S.2
Chen, G.3
Yang, Z.4
Liao, X.5
-
20
-
-
85008921093
-
Chaos-based encryption for digital images and videos
-
Chap. 4, CRC Press, Boca Raton, FL
-
S. Li, G. Chen, and X. Zheng, "Chaos-based encryption for digital images and videos," in Multimedia Security Handbook, Chap. 4, CRC Press, Boca Raton, FL (2004).
-
(2004)
Multimedia Security Handbook
-
-
Li, S.1
Chen, G.2
Zheng, X.3
-
21
-
-
62749096566
-
Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms
-
N. El-Fishawy and O. M. Abu Zaid, "Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms," Int. J. Network Security 5(3), 241-251 (2007).
-
(2007)
Int. J. Network Security
, vol.5
, Issue.3
, pp. 241-251
-
-
El-Fishawy, N.1
Abu Zaid, O.M.2
-
22
-
-
56449096038
-
Improving image encryption using multi-chaotic map," presented at
-
Y. Zhai, S. Lin, and Q. Zhang, "Improving image encryption using multi-chaotic map," presented at Workshop on Power Electronics and Intelligent Transportation System, pp. 143-148 (2008).
-
(2008)
Workshop on Power Electronics and Intelligent Transportation System
, pp. 143-148
-
-
Zhai, Y.1
Lin, S.2
Zhang, Q.3
-
23
-
-
84890522850
-
Communication theory of secrecy system
-
C. E. Shannon, "Communication theory of secrecy system," Bell Syst. Tech. J. 28, 656-715 (1949).
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
24
-
-
34247205141
-
Chaos-based image encryption
-
Springer-Verlag, Berlin
-
Y. B. Mao and G. Chen, "Chaos-based image encryption," in Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neuralcomputing and Robotics, E. Bayro, Ed., pp. 231-265 Springer-Verlag, Berlin (2005).
-
(2005)
Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neuralcomputing and Robotics, E. Bayro, Ed.
, pp. 231-265
-
-
Mao, Y.B.1
Chen, G.2
-
25
-
-
0035451781
-
A new encryption algorithm for image cryptosystems
-
C. C. Chang, M. S. Hwang, and T. S. Chen, "A new encryption algorithm for image cryptosystems," J. Syst. Softw. 58, 83-91 (2001).
-
(2001)
J. Syst. Softw.
, vol.58
, pp. 83-91
-
-
Chang, C.C.1
Hwang, M.S.2
Chen, T.S.3
-
26
-
-
0029332529
-
Image encryption method using a class of fractals
-
C. Alexopoulos, N. Bourbakis, and N. Ioannou, "Image encryption method using a class of fractals," J. Electron. Imaging 4(3), 251-259 (1995).
-
(1995)
J. Electron. Imaging
, vol.4
, Issue.3
, pp. 251-259
-
-
Alexopoulos, C.1
Bourbakis, N.2
Ioannou, N.3
-
27
-
-
0004206137
-
Novel image encryption technique and its application in progressive transmission
-
C. J. Kuo, "Novel image encryption technique and its application in progressive transmission," J. Electron. Imaging 2(4), 345-351 (1993).
-
(1993)
J. Electron. Imaging
, vol.2
, Issue.4
, pp. 345-351
-
-
Kuo, C.J.1
-
28
-
-
0031222252
-
A linear quadtree compression scheme for image encryption
-
H. K. C. Chang and J. L. Liu, "A linear quadtree compression scheme for image encryption," Signal Process. Image Commun. 10(4), 279-290 (1997).
-
(1997)
Signal Process. Image Commun.
, vol.10
, Issue.4
, pp. 279-290
-
-
Chang, H.K.C.1
Liu, J.L.2
-
29
-
-
0037383115
-
A technique for image encryption using digital signature
-
A. Sinha and K. Singh, "A technique for image encryption using digital signature," Opt. Commun. 21(8), 229-234 (2003).
-
(2003)
Opt. Commun.
, vol.21
, Issue.8
, pp. 229-234
-
-
Sinha, A.1
Singh, K.2
-
30
-
-
34247623219
-
An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for image encryption and decryption
-
H. El-din, H. Ahmed, H. M. Kalash, and O. S. Farag Allah, "An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption," Informatica 31(1), 121-129 (2007). (Pubitemid 46683742)
-
(2007)
Informatica (Ljubljana)
, vol.31
, Issue.1
, pp. 121-129
-
-
Ahmed, H.E.-D.H.1
Kalash, H.M.2
Farag Allah, O.S.3
|