-
1
-
-
0001826463
-
RC5 encryption algorithm
-
R. L. Rivest, " RC5 encryption algorithm.," Dr. Dobbs J., 226 (3), 146-148 (1995).
-
(1995)
Dr. Dobbs J.
, vol.226
, Issue.3
, pp. 146-148
-
-
Rivest, R.L.1
-
3
-
-
84949219066
-
A timing attack on RC5
-
in SAC'98,. 10.1007/3-540-48892-8-24
-
H. Handschuh and H. M. Heys, " A timing attack on RC5.," in SAC'98, Lect. Notes Comput. Sci. 1556, 306-318 (1999). 10.1007/3-540-48892-8-24
-
(1999)
Lect. Notes Comput. Sci.
, vol.1556
, pp. 306-318
-
-
Handschuh, H.1
Heys, H.M.2
-
4
-
-
84944874932
-
Known plaintext correlation attack against RC5
-
in CT-RSA 2002,. 10.1007/3-540-45760-7-10
-
A. Miyaji, M. Nonaka, and Y. Takii, " Known plaintext correlation attack against RC5.," in CT-RSA 2002, Lect. Notes Comput. Sci. 2271, 131-148 (2002). 10.1007/3-540-45760-7-10
-
(2002)
Lect. Notes Comput. Sci.
, vol.2271
, pp. 131-148
-
-
Miyaji, A.1
Nonaka, M.2
Takii, Y.3
-
5
-
-
0031223784
-
Differential cryptanalysis of RC5
-
10.1002/ett.4460080503
-
L. R. Knudsen and W. Meier, " Differential cryptanalysis of RC5.," Euro. Trans. Telecommun., 8 (5), 445-454 (1997). 10.1002/ett.4460080503
-
(1997)
Euro. Trans. Telecommun.
, vol.8
, Issue.5
, pp. 445-454
-
-
Knudsen, L.R.1
Meier, W.2
-
7
-
-
16244364260
-
-
MIT Laboratory for Computer Science, Cambridge, MA, revised 20 Mar., see.
-
R. L. Rivest, " The RC5 encryption algorithm.," MIT Laboratory for Computer Science, Cambridge, MA, revised 20 Mar. 1997, see http://theory.lcs.mit.edu/~rivest/Rivest-rc5rev.pdf.
-
(1997)
The RC5 Encryption Algorithm
-
-
Rivest, R.L.1
-
8
-
-
59949096428
-
A block cipher with dynamic S-boxes based on tent map
-
10.1016/j.cnsns.2008.12.005.
-
Y. Wang, K.-W. Wong, X. Liao, and T. Xiang, " A block cipher with dynamic S-boxes based on tent map.," Commun. Nonlinear Sci. Numer. Simul. 14, 3089-3099 (2008). 10.1016/j.cnsns.2008.12.005.
-
(2008)
Commun. Nonlinear Sci. Numer. Simul.
, vol.14
, pp. 3089-3099
-
-
Wang, Y.1
Wong, K.-W.2
Liao, X.3
Xiang, T.4
-
9
-
-
41149123614
-
An improved chaotic cryptosystem with external key
-
DOI 10.1016/j.cnsns.2007.04.017, PII S1007570407000974
-
T. Xiang, K.-W. Wong, L. Xiaofeng, " An improved chaotic cryptosystem with external key.," Commun. Nonlinear Sci. Numer. Simul. 13, 1879-1887 (2008). 10.1016/j.cnsns.2007.04.017 (Pubitemid 351426257)
-
(2008)
Communications in Nonlinear Science and Numerical Simulation
, vol.13
, Issue.9
, pp. 1879-1887
-
-
Xiang, T.1
Wong, K.-w.2
Liao, X.3
-
10
-
-
67349286030
-
Efficient image or video encryption based on spatiotemporal chaos system
-
10.1016/j.chaos.2007.10.054
-
L. Shiguo, " Efficient image or video encryption based on spatiotemporal chaos system.," Chaos, Solitons Fractals 40 (5), 2509-2519 (2009). 10.1016/j.chaos.2007.10.054
-
(2009)
Chaos, Solitons Fractals
, vol.40
, Issue.5
, pp. 2509-2519
-
-
Shiguo, L.1
-
11
-
-
0004206137
-
Novel image encryption technique and its application in progressive transmission
-
10.1117/12.148572
-
C. J. Kuo, " Novel image encryption technique and its application in progressive transmission.," J. Electron. Imaging 2 (4), 345-351 (1993). 10.1117/12.148572
-
(1993)
J. Electron. Imaging
, vol.2
, Issue.4
, pp. 345-351
-
-
Kuo, C.J.1
-
12
-
-
33747058774
-
Image encryption using chaotic logistic map
-
DOI 10.1016/j.imavis.2006.02.021, PII S026288560600103X
-
N. K. Pareek, V. Patidar, and K.K. Sud, " Image encryption using chaotic logistic map.," Image Vis. Comput. 24, 926-934 (2006). 10.1016/j.imavis.2006.02.021 (Pubitemid 44209299)
-
(2006)
Image and Vision Computing
, vol.24
, Issue.9
, pp. 926-934
-
-
Pareek, N.K.1
Patidar, V.2
Sud, K.K.3
-
13
-
-
0029332529
-
Image encryption method using a class of fractals
-
10.1117/12.208654
-
C. Alexopoulos, N. Bourbakis, and N. Ioannou, " Image encryption method using a class of fractals.," J. Electron. Imaging 4 (3), 251-259 (1995). 10.1117/12.208654
-
(1995)
J. Electron. Imaging
, vol.4
, Issue.3
, pp. 251-259
-
-
Alexopoulos, C.1
Bourbakis, N.2
Ioannou, N.3
-
14
-
-
84890522850
-
Communication theory of secrecy system
-
C. E. Shannon, " Communication theory of secrecy system.," Bell Syst. Tech. J. 28, 656-715 (1949).
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
15
-
-
0035451781
-
A new encryption algorithm for image cryptosystems
-
10.1016/S0164-1212(01)00029-2
-
C. C. Chang, M. S. Hwang, and T. S. Chen, " A new encryption algorithm for image cryptosystems.," J. Syst. Softw. 58, 83-91 (2001). 10.1016/S0164-1212(01)00029-2
-
(2001)
J. Syst. Softw.
, vol.58
, pp. 83-91
-
-
Chang, C.C.1
Hwang, M.S.2
Chen, T.S.3
-
16
-
-
79957956726
-
-
L. Kocarev, Z. Galias, and S. Lian, Eds., Springer, New York.
-
Intelligent Copmuting Based on Chaos, L. Kocarev, Z. Galias, and, S. Lian, Eds., Springer, New York (2009).
-
(2009)
Intelligent Copmuting Based on Chaos
-
-
-
17
-
-
10444257964
-
A novel fast image encryption scheme based on 3D chaotic baker maps
-
DOI 10.1142/S021812740401151X, PII S021812740401151X
-
Y. Mao, G. Chen, and S. Lian, " A novel fast image encryption scheme based on 3D chaotic baker maps.," Int. J. Bifurcation Chaos Appl. Sci. Eng. 14 (10), 3613-3624 (2004). 10.1142/S021812740401151X (Pubitemid 39638599)
-
(2004)
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
, vol.14
, Issue.10
, pp. 3613-3624
-
-
Mao, Y.1
Chen, G.2
Lian, S.3
-
18
-
-
1342306864
-
A symmetric image encryption based on 3D chaotic maps
-
10.1016/j.chaos.2003.12.022
-
G. Chen, Y. Mao, and C. K. Chui, " A symmetric image encryption based on 3D chaotic maps.," Chaos, Solitons Fractals 21 (3), 749-761 (2004). 10.1016/j.chaos.2003.12.022
-
(2004)
Chaos, Solitons Fractals
, vol.21
, Issue.3
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
19
-
-
77950446474
-
Homomorphic image encryption
-
10.1117/1.3167847
-
I. F. Elashry, O. S. Farag Allah, A. M. Abbas, S. El-Rabaie, and F. E. Abd El-Samie, " Homomorphic image encryption.," J. Electron. Imaging 18 (3), 033002 (2009). 10.1117/1.3167847
-
(2009)
J. Electron. Imaging
, vol.18
, Issue.3
, pp. 033002
-
-
Elashry, I.F.1
Farag Allah, O.S.2
Abbas, A.M.3
El-Rabaie, S.4
Abd El-Samie, F.E.5
-
20
-
-
54949158037
-
Color image encryption and decryption for twin images in fractional Fourier domain
-
10.1016/j.optcom.2008.08.024
-
M. Joshi, Chandrashakher, and K. Singh, " Color image encryption and decryption for twin images in fractional Fourier domain.," Opt. Commun. 281, 5713-5720 (2008). 10.1016/j.optcom.2008.08.024
-
(2008)
Opt. Commun.
, vol.281
, pp. 5713-5720
-
-
Joshi, M.1
Chandrashakher2
Singh, K.3
|