메뉴 건너뛰기




Volumn 1, Issue , 2010, Pages 428-431

An improved s-box based algorithm for efficient image encryption

Author keywords

Cryptography; Image encryption; Rijndael; S box

Indexed keywords

IMAGE ENHANCEMENT;

EID: 78049344978     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICEIE.2010.5559668     Document Type: Conference Paper
Times cited : (2)

References (14)
  • 1
    • 49149096383 scopus 로고    scopus 로고
    • A real time sbox construction using arithmetic modulo prime numbers
    • Abuelyman, E.S. and M.A. El-Affendi, 2007. A real time sbox construction using arithmetic modulo prime numbers. J. Digital Inform. Manage., 5: 354-260. http://www.dirf.org/jdim/v5i60a2.pdf.
    • (2007) J. Digital Inform. Manage. , vol.5 , pp. 260-354
    • Abuelyman, E.S.1    El-Affendi, M.A.2
  • 2
    • 62849101473 scopus 로고    scopus 로고
    • Encryption-compression of images based on FMT and AES algorithm
    • Benabdellah, M., M.M. Himmi, N. Zahid, F. Regragui and E.H. Bouyakhf, 2007. Encryption- compression of images based on FMT and AES algorithm. Applied Math. Sci., 1: 2203-2219. http://www.m-hikari.com/ams/ams-password-2007/ams- password45-48-2007/benabdellahAMS45-48-2007.pdf.
    • (2007) Applied Math. Sci. , vol.1 , pp. 2203-2219
    • Benabdellah, M.1    Himmi, M.M.2    Zahid, N.3    Regragui, F.4    Bouyakhf, E.H.5
  • 3
    • 33745642130 scopus 로고    scopus 로고
    • Related key impossible differential attacks on 8-round AES-192
    • Biham, E., O. Dunkelman and N. Keller, 2006. Related key impossible differential attacks on 8-round AES- 192. Lecture Notes Comput. Sci., 3860: 21-33. http://www.springerlink.com/content/p804p313030l1680/.
    • (2006) Lecture Notes Comput. Sci. , vol.3860 , pp. 21-33
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 4
    • 38349175104 scopus 로고    scopus 로고
    • A novel heuristic method for obtaining S-boxes
    • DOI: 10.1016/j.chaos.2006.08.003
    • Chen, G., 2008. A novel heuristic method for obtaining S-boxes. Chaos Solit. Fract., 36: 1028-1036. DOI: 10.1016/j.chaos.2006.08.003.
    • (2008) Chaos Solit. Fract. , vol.36 , pp. 1028-1036
    • Chen, G.1
  • 7
    • 62749096566 scopus 로고    scopus 로고
    • Quality of encryption measurement of bitmap images with RC6, MRC6 and rijndael block cipher algorithms
    • El-Fishawy, N. and O.M. Abu Zaid, 2007. Quality of encryption measurement of bitmap images with RC6, MRC6 and rijndael block cipher algorithms. Int. J. Network Secur., 5: 241-251. http://cmpe.emu.edu.tr/chefranov/cmpe553-07-Spring/ Notes/ijns-2007-v5-n3-p241-251.pdf.
    • (2007) Int. J. Network Secur. , vol.5 , pp. 241-251
    • El-Fishawy, N.1    Zaid, O.M.A.2
  • 8
    • 24944480579 scopus 로고    scopus 로고
    • Related-key differential cryptanalysis of 192-bit key AES variants
    • 3006
    • Jakimoski, G. and Y. Desmedt, 2004. Related-key differential cryptanalysis of 192-bit key AES variants. Lecture Notes Comput. Sci., 3006: 208-221. http://www.springerlink.com/content/8gnbt35440jx683y/.
    • (2004) Lecture Notes Comput. Sci. , pp. 208-221
    • Jakimoski, G.1    Desmedt, Y.2
  • 11
    • 67649185123 scopus 로고    scopus 로고
    • An asymmetric image encryption based on matrix transformation
    • Shuihua, H. and Y. Shuangyuan, 2005. An asymmetric image encryption based on matrix transformation. ECTI Trans.Comp. Inform. Technol., 1:12.
    • (2005) ECTI Trans.Comp. Inform. Technol. , vol.1 , pp. 12
    • Shuihua, H.1    Shuangyuan, Y.2
  • 14
    • 37349103020 scopus 로고    scopus 로고
    • Related-key impossible differential attacks on reduced-round AES-256
    • Zhang, W.T., W.L. Wu and L. Zhang, 2007. Related-key impossible differential attacks on reduced-round AES-256. J. Software, 18: 2893-2901. http://www.lois.cn/LOIS-AES/data/AES-256.pd.
    • (2007) J. Software , vol.18 , pp. 2893-2901
    • Zhang, W.T.1    Wu, W.L.2    Zhang, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.