-
1
-
-
8744261172
-
-
Oxford University Press, USA
-
N. Malcolm, Aspects of Hobbes (Oxford University Press, USA, 2003).
-
(2003)
Aspects of Hobbes
-
-
Malcolm, N.1
-
2
-
-
0034249821
-
Partial Encryption of Compressed Images and Videos
-
H. Cheng, X. Li, Partial Encryption of Compressed Images and Videos, IEEE Trans Signal Process, 48, 8, 2000, pp. 2439-2451.
-
(2000)
IEEE Trans Signal Process
, vol.48
, Issue.8
, pp. 2439-2451
-
-
Cheng, H.1
Li, X.2
-
3
-
-
0035451781
-
A New Encryption Algorithm for Image Cryptosystems
-
C. C. Chang, M. S. Hwang, T. S. Chen, A New Encryption Algorithm for Image Cryptosystems, J Syst Software, 58, 2, 2001, pp. 83-91.
-
(2001)
J Syst Software
, vol.58
, Issue.2
, pp. 83-91
-
-
Chang, C.C.1
Hwang, M.S.2
Chen, T.S.3
-
4
-
-
0036740496
-
Image Encryption Scheme Based on a Truncated Baker Transformation
-
E85-A
-
K. Yano, K. Tanaka, Image Encryption Scheme Based on a Truncated Baker Transformation, IEICE Trans Fundam, E85-A, 9, 2002, pp. 2025-2035.
-
(2002)
IEICE Trans Fundam
, vol.9
, pp. 2025-2035
-
-
Yano, K.1
Tanaka, K.2
-
5
-
-
0038273965
-
Efficient Frequency Domain Selective Scrambling of Digital Video
-
W. Zeng, S. Lei, Efficient Frequency Domain Selective Scrambling of Digital Video, IEEE Transactions on Multimedia, 5, 2003, pp. 118-129.
-
(2003)
IEEE Transactions On Multimedia
, vol.5
, pp. 118-129
-
-
Zeng, W.1
Lei, S.2
-
6
-
-
1542316660
-
Image and Video Encryption Using SCAN Patterns
-
S. S. Maniccam, N. G. Bourbakis, Image and Video Encryption Using SCAN Patterns, Pattern Recogn, 37, 4, 2004, pp. 725-737.
-
(2004)
Pattern Recogn
, vol.37
, Issue.4
, pp. 725-737
-
-
Maniccam, S.S.1
Bourbakis, N.G.2
-
7
-
-
26844567623
-
Design of Integrated Multimedia Compression and Encryption Systems
-
C. P. Wu, C. C. J. Kuo, Design of Integrated Multimedia Compression and Encryption Systems, IEEE Trans Multimedia, 7, 5, 2005, pp. 828-839.
-
(2005)
IEEE Trans Multimedia
, vol.7
, Issue.5
, pp. 828-839
-
-
Wu, C.P.1
Kuo, C.C.J.2
-
8
-
-
33745610486
-
A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption
-
Y. Mao, M. Wu, A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption, IEEE Trans Image Process, 15, 7, 2006, pp. 2061-2075.
-
(2006)
IEEE Trans Image Process
, vol.15
, Issue.7
, pp. 2061-2075
-
-
Mao, Y.1
Wu, M.2
-
9
-
-
78049452836
-
A Chaotic Image Encryption Algorithm Based on Perceptron Model
-
doi: 10.1007/s11071-010-9749-8
-
X. Y. Wang, L. Yang, R. Liu, A. Kadir, A Chaotic Image Encryption Algorithm Based on Perceptron Model, Nonlinear Dyn, 2010, doi: 10.1007/s11071-010-9749-8.
-
(2010)
Nonlinear Dyn
-
-
Wang, X.Y.1
Yang, L.2
Liu, R.3
Kadir, A.4
-
10
-
-
78650278138
-
An Applied Imagery Encryption Algorithm Based On Shuffling and Baker's Map
-
Florida, USA
-
A. Jolfaei, A. Mirghadri, An Applied Imagery Encryption Algorithm Based on Shuffling and Baker's Map, The 2010 International Conference on Artificial Intelligence and Pattern Recognition (AIPR-10), 2010, Florida, USA, pp. 279-285.
-
(2010)
The 2010 International Conference on Artificial Intelligence and Pattern Recognition (AIPR-10)
, pp. 279-285
-
-
Jolfaei, A.1
Mirghadri, A.2
-
11
-
-
79251643560
-
A Low Cost Multipurpose Algorithm for Secure Transfer of Medical Images
-
S. Boucherkha, Z. Laboudi, M. Benmohamed, A Low Cost Multipurpose Algorithm for Secure Transfer of Medical Images, International Review on Computers and Software (IRECOS), 1, 3, 2006, pp. 217-223.
-
(2006)
International Review On Computers and Software (IRECOS)
, vol.1
, Issue.3
, pp. 217-223
-
-
Boucherkha, S.1
Laboudi, Z.2
Benmohamed, M.3
-
12
-
-
0032089417
-
Symmetric Ciphers Based on Two Dimensional Chaotic Maps
-
J. Fridrich, Symmetric Ciphers Based on Two Dimensional Chaotic Maps, International Journal of Bifurcat Chaos, 8, 6, 1998, pp. 1259-1284.
-
(1998)
International Journal of Bifurcat Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
13
-
-
0035250017
-
Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps
-
G. Jakimoski, L. Kocarev, Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps, IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, 48, 2, 2001.
-
(2001)
IEEE Transactions On Circuits and Systems-I: Fundamental Theory and Applications
, vol.48
, pp. 2
-
-
Jakimoski, G.1
Kocarev, L.2
-
14
-
-
17144443264
-
Chaos-based Cryptograph Incorporated with S-box Algebraic Operation
-
G. N. Tang, S. H. Wang, H. P. Lu, G. Hu, Chaos-based Cryptograph Incorporated with S-box Algebraic Operation. Phys Lett A, 318, 2003, pp. 388-398.
-
(2003)
Phys Lett A
, vol.318
, pp. 388-398
-
-
Tang, G.N.1
Wang, S.H.2
Lu, H.P.3
Hu, G.4
-
15
-
-
10444257964
-
A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps
-
Y. Mao, G. Chen, S. Lian, A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps, International Journal of Bifurcation and Chaos, 14, 10, 2004, pp. 3613-3624.
-
(2004)
International Journal of Bifurcation and Chaos
, vol.14
, Issue.10
, pp. 3613-3624
-
-
Mao, Y.1
Chen, G.2
Lian, S.3
-
16
-
-
1342306864
-
A Symmetric Encryption Scheme Based on 3D Chaotic Cat Map
-
G. Chen, Y. Mao, C. K. Chui, A Symmetric Encryption Scheme Based on 3D Chaotic Cat Map, Chaos, Solitons & Fractals, 21, 2004, pp. 749-761.
-
(2004)
Chaos, Solitons & Fractals
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
17
-
-
24944459842
-
A Chaos-based Image Encryption Algorithm
-
Z. Guan, F. Huang, W. Guan, A Chaos-based Image Encryption Algorithm, Phys Lett A, 346, 2005, pp. 153-157.
-
(2005)
Phys Lett A
, vol.346
, pp. 153-157
-
-
Guan, Z.1
Huang, F.2
Guan, W.3
-
18
-
-
17644405819
-
A Block Cipher Based on a Suitable Use of Chaotic Standard Map
-
S. G. Lian, J. Sun, Z. Wang, A Block Cipher Based on a Suitable Use of Chaotic Standard Map, Chaos, Solitons and Fractals, 26, 1, 2005, pp. 117-129.
-
(2005)
Chaos, Solitons and Fractals
, vol.26
, Issue.1
, pp. 117-129
-
-
Lian, S.G.1
Sun, J.2
Wang, Z.3
-
19
-
-
29644447800
-
A Multiple Pseudorandombit Generator Based on a Spatiotemporal Chaotic Map
-
P. Li, Z. Li, W.A. Halanga, G. Chen, A Multiple Pseudorandombit Generator Based on a Spatiotemporal Chaotic Map, Phys Lett A, 349, 6, 2006, pp. 467-473.
-
(2006)
Phys Lett A
, vol.349
, Issue.6
, pp. 467-473
-
-
Li, P.1
Li, Z.2
Halanga, W.A.3
Chen, G.4
-
20
-
-
64749114044
-
On Multi-scroll Chaotic Attractors in Hysteresis-based Piecewise Linear Systems
-
F. Han, X. Yu, Y. Feng, J. Hu, On Multi-scroll Chaotic Attractors in Hysteresis-based Piecewise Linear Systems, IEEE Transactions on Circuits and Systems-II, 54, 11, 2007, pp. 1004-1008.
-
(2007)
IEEE Transactions On Circuits and Systems-II
, vol.54
, Issue.11
, pp. 1004-1008
-
-
Han, F.1
Yu, X.2
Feng, Y.3
Hu, J.4
-
21
-
-
37549014203
-
A New Image Encryption Algorithm Based on Hyper-chaos
-
T. Gao, Z. Chen, A New Image Encryption Algorithm Based on Hyper-chaos, Phys Lett A, 374, 4, 2008, pp. 394-400.
-
(2008)
Phys Lett A
, vol.374
, Issue.4
, pp. 394-400
-
-
Gao, T.1
Chen, Z.2
-
22
-
-
40849137988
-
A Fast Image Encryption Scheme Based on Chaotic Standard Map
-
K. W. Wong, B. S. H. Kwok, W. S Law, A Fast Image Encryption Scheme Based on Chaotic Standard Map, Phys Lett A, 372, 2008, pp. 2645-2652.
-
(2008)
Phys Lett A
, vol.372
, pp. 2645-2652
-
-
Wong, K.W.1
Kwok, B.S.H.2
Law, W.S.3
-
23
-
-
67349286030
-
Efficient Image or Video Encryption Based on Spatiotemporal Chaos System, Chaos
-
S. Lian, Efficient Image or Video Encryption Based on Spatiotemporal Chaos System, Chaos, Solitons and Fractals, 40, 2009, pp. 2509-2519.
-
(2009)
Solitons and Fractals
, vol.40
, pp. 2509-2519
-
-
Lian, S.1
-
24
-
-
78651457419
-
A Novel Scheme for Image Encryption Based on 2D Piecewise Chaotic Maps
-
A. Akhshani, S. Behnia, A. Akhavan, H. Abu Hassan, Z. Hassan, A Novel Scheme for Image Encryption Based on 2D Piecewise Chaotic Maps, Optics Communications 283, 2010, pp. 3259-3266.
-
(2010)
Optics Communications
, vol.283
, pp. 3259-3266
-
-
Akhshani, A.1
Behnia, S.2
Akhavan, A.3
Abu, H.H.4
Hassan, Z.5
-
26
-
-
33846504442
-
A Stream Cipher Based on a Spatiotemporal Chaotic System
-
P. Li, Z. Li, W.A. Halanga, G. Chen, A Stream Cipher Based on a Spatiotemporal Chaotic System, Chaos, Solitons & Fractals, 32, 5, 2007, pp. 1867-1876.
-
(2007)
Chaos, Solitons & Fractals
, vol.32
, Issue.5
, pp. 1867-1876
-
-
Li, P.1
Li, Z.2
Halanga, W.A.3
Chen, G.4
-
27
-
-
34247623219
-
An Efficient Chaos based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption
-
H. H. Ahmed, H. M. Kalash, O. S. Farag Allah, An Efficient Chaos based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption, Informatica, 31, 2007, pp. 121-129.
-
(2007)
Informatica
, vol.31
, pp. 121-129
-
-
Ahmed, H.H.1
Kalash, H.M.2
Farag, A.O.S.3
-
28
-
-
70749118173
-
Bio-Chaotic Stream Cipher-Based Iris Image Encryption
-
A. S. Alghamdi, H. Ullah, M. Mahmud, M. K. Khan, Bio-Chaotic Stream Cipher-Based Iris Image Encryption. The International Conference on Computational Science and Engineering, 2009, pp. 739-744.
-
(2009)
The International Conference on Computational Science and Engineering
, pp. 739-744
-
-
Alghamdi, A.S.1
Ullah, H.2
Mahmud, M.3
Khan, M.K.4
-
29
-
-
77951561021
-
A Novel Chaotic Stream Cipher and Its Application to Palmprint Template Protection
-
H. J. Li, J. S. Zhang, A Novel Chaotic Stream Cipher and Its Application to Palmprint Template Protection, Chinese Phys B, 19, 4, 2010, 040505.
-
(2010)
Chinese Phys B
, vol.19
, Issue.4
, pp. 040505
-
-
Li, H.J.1
Zhang, J.S.2
-
30
-
-
78049346086
-
An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption
-
M. A. B. Younes, A. Jantan, An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption, IJCSNS International Journal of Computer Science and Network Security, 8, 4, 2008, pp. 191-197.
-
(2008)
IJCSNS International Journal of Computer Science and Network Security
, vol.8
, Issue.4
, pp. 191-197
-
-
Younes, M.A.B.1
Jantan, A.2
-
31
-
-
59949096428
-
A Block Cipher with Dynamic S-boxes Based on Tent Map
-
Y. Wang, K. W. Wong, X. Liao, T. Xiang, A Block Cipher with Dynamic S-boxes Based on Tent Map, Commun Nonlinear SciNumer Simulat, 14, 2009, pp. 3089-3099.
-
(2009)
Commun Nonlinear SciNumer Simulat
, vol.14
, pp. 3089-3099
-
-
Wang, Y.1
Wong, K.W.2
Liao, X.3
Xiang, T.4
-
32
-
-
34548615503
-
A Cryptography with Chaotic Mixing
-
L. P. L. D. Oliveira, M. Sobottka, A Cryptography with Chaotic Mixing, Chaos, Solitons and Fractals, 35, 3, 2008, pp. 446-471.
-
(2008)
Chaos, Solitons and Fractals
, vol.35
, Issue.3
, pp. 446-471
-
-
Oliveira, L.P.L.D.1
Sobottka, M.2
-
33
-
-
60049083969
-
A New Substitution- Diffusion Based Image Cipher Using Chaotic Standard and Logistic Maps
-
V. Patidar, N. K. Pareek, K. K. Sud, A New Substitution- Diffusion Based Image Cipher Using Chaotic Standard and Logistic Maps, Commun Nonlinear SciNumer Simulat, 14, 2009, pp. 3056-3075.
-
(2009)
Commun Nonlinear SciNumer Simulat
, vol.14
, pp. 3056-3075
-
-
Patidar, V.1
Pareek, N.K.2
Sud, K.K.3
-
34
-
-
77950918757
-
Modified Substitution-Diffusion Image Cipher Using Chaotic Standard and Logistic Maps
-
V. Patidar, N. K. Pareek, G. Purohit, K. K. Sud, Modified Substitution-Diffusion Image Cipher Using Chaotic Standard and Logistic Maps, Commun Nonlinear SciNumer Simulat, 15, 2010, pp. 2755-2765.
-
(2010)
Commun Nonlinear SciNumer Simulat
, vol.15
, pp. 2755-2765
-
-
Patidar, V.1
Pareek, N.K.2
Purohit, G.3
Sud, K.K.4
-
36
-
-
21144433203
-
Analysis of A Block Cipher Based on Chaos
-
J. Chenhui, Analysis of A Block Cipher Based on Chaos, Engineering Science, 3, 6, 2001, pp. 75-80.
-
(2001)
Engineering Science
, vol.3
, Issue.6
, pp. 75-80
-
-
Chenhui, J.1
-
37
-
-
5144227233
-
Analysis of Two Stream Ciphers Based on Chaos
-
J. Chenhui, G. Heiying, Analysis of Two Stream Ciphers Based on Chaos, Acta Electronica Sinica, 32, 7, 2004, pp. 1066-1070.
-
(2004)
Acta Electronica Sinica
, vol.32
, Issue.7
, pp. 1066-1070
-
-
Chenhui, J.1
Heiying, G.2
-
38
-
-
0037214620
-
Pseudorandom Bits Generated by Chaotic Maps
-
L. Kocarev, G. Jakimoski, Pseudorandom Bits Generated by Chaotic Maps, IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, 50, 1, 2003, pp. 123-126.
-
(2003)
IEEE Transactions On Circuits and Systems-I: Fundamental Theory and Applications
, vol.50
, Issue.1
, pp. 123-126
-
-
Kocarev, L.1
Jakimoski, G.2
-
39
-
-
34248396867
-
Attack with Know Image to a Symmetric Image Encryption Scheme
-
G. Jiansheng, Z. Cong'e, J. Chenhui, Attack with Know Image to a Symmetric Image Encryption Scheme, Systems Engineering and Electronics, 29, 3, 2007, pp. 341-345.
-
(2007)
Systems Engineering and Electronics
, vol.29
, Issue.3
, pp. 341-345
-
-
Jiansheng, G.1
Cong'e, Z.2
Chenhui, J.3
-
40
-
-
0035332223
-
Reconstructing the Keystream from a Chaotic Encryption Scheme
-
A. T. Parker, K. V. Short, Reconstructing the Keystream from a Chaotic Encryption Scheme, IEEE Transactions on Circuits and Systems-I, 48, 5, 2001, pp. 104-112.
-
(2001)
IEEE Transactions On Circuits and Systems-I
, vol.48
, Issue.5
, pp. 104-112
-
-
Parker, A.T.1
Short, K.V.2
-
41
-
-
33750542126
-
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
-
G. Alvarez, S. Li, Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems, International Journal of Bifurcation and Chaos, 16, 8, 2006, pp. 2129-2151.
-
(2006)
International Journal of Bifurcation and Chaos
, vol.16
, Issue.8
, pp. 2129-2151
-
-
Alvarez, G.1
Li, S.2
-
42
-
-
34748897135
-
Improved Baker Map For Image Encryption
-
F. Han, X. Yu, S. Han, Improved Baker Map for Image Encryption, The first International Symposium on Systems and Control in Aerospace and Astronautics (ISSCAA), 2006, pp. 1276-1279.
-
(2006)
The first International Symposium on Systems and Control in Aerospace and Astronautics (ISSCAA)
, pp. 1276-1279
-
-
Han, F.1
Yu, X.2
Han, S.3
-
44
-
-
76449120774
-
Cryptographic Pseudo-random Sequences from the Chaotic Henon Map
-
M. Suneel, Cryptographic Pseudo-random Sequences from the Chaotic Henon Map, Sadhana, 34, 5, 2009, pp. 689-701.
-
(2009)
Sadhana
, vol.34
, Issue.5
, pp. 689-701
-
-
Suneel, M.1
-
45
-
-
0002591468
-
A Two-Dimensional Mapping with a Strange Attractor
-
M. Henon, A Two-Dimensional Mapping with a Strange Attractor, Communication in Mathematical physics, 50, 1976, pp. 69-77.
-
(1976)
Communication In Mathematical Physics
, vol.50
, pp. 69-77
-
-
Henon, M.1
-
46
-
-
34748887111
-
A New Image Encryption Approach Using Combinational Permutation Techniques
-
Y. V. Mitra, S. Rao, S. R. M. Prasanna, A New Image Encryption Approach Using Combinational Permutation Techniques, International Journal of Computer Science, 1, 2, 2006, pp. 127-131.
-
(2006)
International Journal of Computer Science
, vol.1
, Issue.2
, pp. 127-131
-
-
Mitra, Y.V.1
Rao, S.2
Prasanna, S.R.M.3
-
48
-
-
42049108003
-
A General Quantitative Cryptanalysis of Permutation-only Multimedia Ciphers against Plaintext Attacks
-
S. Li, C. Li, G. Chen, N. G. Bourbakis, K. T. Lo, A General Quantitative Cryptanalysis of Permutation-only Multimedia Ciphers against Plaintext Attacks, Signal Processing: Image Communication, 23, 3, 2008, pp. 212-223.
-
(2008)
Signal Processing: Image Communication
, vol.23
, Issue.3
, pp. 212-223
-
-
Li, S.1
Li, C.2
Chen, G.3
Bourbakis, N.G.4
Lo, K.T.5
-
50
-
-
0742288591
-
Generating Chaotic Stream Ciphers Using Chaotic Systems
-
P. H. Lee, S. C. Pei, Y. Y. Chen, Generating Chaotic Stream Ciphers Using Chaotic Systems, Chinese Journal of Physics, 41, 6, 2003, pp. 559-581.
-
(2003)
Chinese Journal of Physics
, vol.41
, Issue.6
, pp. 559-581
-
-
Lee, P.H.1
Pei, S.C.2
Chen, Y.Y.3
-
51
-
-
33947638872
-
A New Measurement Method of Image Encryption
-
X. Y. Yu, J. Zhang, H. E. Ren, S. Li, X.D. Zhang, A New Measurement Method of Image Encryption, Journal of Physics: Conference Series, 48, 2006, pp. 408-411.
-
(2006)
Journal of Physics: Conference Series
, vol.48
, pp. 408-411
-
-
Yu, X.Y.1
Zhang, J.2
Ren, H.E.3
Li, S.4
Zhang, X.D.5
-
52
-
-
78049325623
-
Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation
-
L. Xiangdong, Z. Junxing, Z. Jinhai, H. Xiqin, Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation, IJCSNS International Journal of Computer Science and Network Security, 8, 1, 2008, pp. 64-68.
-
(2008)
IJCSNS International Journal of Computer Science and Network Security
, vol.8
, Issue.1
, pp. 64-68
-
-
Xiangdong, L.1
Junxing, Z.2
Jinhai, Z.3
Xiqin, H.4
-
53
-
-
33747065479
-
Data-Image-Video Encryption
-
M. Yang, N. Bourbakis, S. Li, Data-Image-Video Encryption, IEEE Potentials, 23, 3, 2004, pp. 28-34.
-
(2004)
IEEE Potentials
, vol.23
, Issue.3
, pp. 28-34
-
-
Yang, M.1
Bourbakis, N.2
Li, S.3
-
54
-
-
0242528365
-
Substitution Cipher with Pseudo-random Shuffling: The Dynamic Substitution Combiner
-
T. Ritter, Substitution Cipher with Pseudo-random Shuffling: The Dynamic Substitution Combiner, Cryptologia, 14, 4, 1990, pp. 289-303.
-
(1990)
Cryptologia
, vol.14
, Issue.4
, pp. 289-303
-
-
Ritter, T.1
-
55
-
-
9544243650
-
Transposition Cipher with Pseudo-random Shuffling: The Dynamic Transposition Combiner
-
T. Ritter, Transposition Cipher with Pseudo-random Shuffling: The Dynamic Transposition Combiner, Cryptologia, 15, 1, 1991, pp. 1-17.
-
(1991)
Cryptologia
, vol.15
, Issue.1
, pp. 1-17
-
-
Ritter, T.1
-
56
-
-
0037053849
-
A Fast Chaotic Cryptographic Scheme with Dynamic Lookup Table
-
K. W. Wong, A Fast Chaotic Cryptographic Scheme with Dynamic Lookup Table, Phys Lett A, 298, 4, 2002, pp. 238-242.
-
(2002)
Phys Lett A
, vol.298
, Issue.4
, pp. 238-242
-
-
Wong, K.W.1
-
57
-
-
0016579870
-
Some Cryptographic Techniques for Machine to Machine Data Communications
-
H. Feistel, W. Notz, J. L. Smith, Some Cryptographic Techniques for Machine to Machine Data Communications, Proceedings of IEEE, 63, 11, 1975, pp. 1545-1554.
-
(1975)
Proceedings of IEEE
, vol.63
, Issue.11
, pp. 1545-1554
-
-
Feistel, H.1
Notz, W.2
Smith, J.L.3
-
59
-
-
63149125847
-
-
Internet Draft
-
S. Thomas, D. Anthony, T. Berson, G. Gong, The W7 Stream Cipher Algorithm, 2002, Internet Draft.
-
(2002)
The W7 Stream Cipher Algorithm
-
-
Thomas, S.1
Anthony, D.2
Berson, T.3
Gong, G.4
-
60
-
-
84974707207
-
-
Springer
-
A. Biryukov, A. Shamir, D. Wagner, Real Time Cryptanalysis of A5/1 on a PC, FSE'2000, LNCS 1978, Springer, 2001, pp. 1-18.
-
(2001)
Real Time Cryptanalysis of A5/1 On a PC, FSE'2000, LNCS 1978
, pp. 1-18
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
64
-
-
78651562449
-
Cryptography based on Spatiotemporal Chaos System and Multiple Maps
-
J. He, Z. B. Li, and H.F. Qian, Cryptography based on Spatiotemporal Chaos System and Multiple Maps, Journal of Software, 5, 4, 2010, pp. 421-428.
-
(2010)
Journal of Software
, vol.5
, Issue.4
, pp. 421-428
-
-
He, J.1
Li, Z.B.2
Qian, H.F.3
-
65
-
-
34548237327
-
TestU01: A C Library for Empirical Testing of Random Number Generators
-
P. L'ecuyer, R. Simard, TestU01: A C Library for Empirical Testing of Random Number Generators, ACM Transactions on Mathematical Software, 33, 4, 2007, Article 22.
-
(2007)
ACM Transactions On Mathematical Software
, vol.33
, Issue.4
, pp. 22
-
-
L'ecuyer, P.1
Simard, R.2
-
66
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. E. Shannon, Communication Theory of Secrecy Systems, Bell Syst Tech J, 28, 1949, pp. 656-715.
-
(1949)
Bell Syst Tech J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
67
-
-
33846062542
-
Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images
-
H. H. Ahmed, H. M. Kalash, O. S. Farag Allah, Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images, Journal of Optical Engineering, 45, 2006.
-
(2006)
Journal of Optical Engineering
, pp. 45
-
-
Ahmed, H.H.1
Kalash, H.M.2
Farag, A.O.S.3
-
68
-
-
79953212703
-
A New Approach to Measure Quality of Image Encryption
-
A. Jolfaei, A. Mirghadri, A New Approach to Measure Quality of Image Encryption, International Journal of Computer and Network Security, 2, 8, 2010, pp. 38-44.
-
(2010)
International Journal of Computer and Network Security
, vol.2
, Issue.8
, pp. 38-44
-
-
Jolfaei, A.1
Mirghadri, A.2
-
69
-
-
51249123329
-
Image Encryption with Chaotically Coupled Chaotic Maps
-
A. N. Pisarchik, M Zanin, Image Encryption with Chaotically Coupled Chaotic Maps, Physica D, 237, 20, 2008, pp. 2638-2648.
-
(2008)
Physica D
, vol.237
, Issue.20
, pp. 2638-2648
-
-
Pisarchik, A.N.1
Zanin, M.2
-
70
-
-
33344455991
-
Breaking an Encryption Scheme Based on Chaotic Baker Map
-
G. Alvarez, S. Li, Breaking an Encryption Scheme Based on Chaotic Baker Map, Phys Lett A, 352, 1-2, 2006, pp. 78-82.
-
(2006)
Phys Lett A
, vol.352
, Issue.1-2
, pp. 78-82
-
-
Alvarez, G.1
Li, S.2
|