-
1
-
-
84874975376
-
Countermeasures for hardware fault attack in multi-prime RSA cryptosystems
-
Z. E. Abid and W. Wang, "Countermeasures for hardware fault attack in multi-prime RSA cryptosystems," International Journal of Network Security, vol. 6, no. 2, pp. 190-200, 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.2
, pp. 190-200
-
-
Abid, Z.E.1
Wang, W.2
-
2
-
-
0042786512
-
Cryptography with chaos
-
M. S. Baptista, "Cryptography with chaos," Physics Letters A, vol. 240, pp. 50-54, 1998.
-
(1998)
Physics Letters A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
3
-
-
0000326312
-
Picture data encryption using SCAN pattern
-
N. Bourbakis, and C. Alexopoulos, "Picture data encryption using SCAN pattern," Pattern Recognition, vol. 25, pp. 567-581, 1992.
-
(1992)
Pattern Recognition
, vol.25
, pp. 567-581
-
-
Bourbakis, N.1
Alexopoulos, C.2
-
4
-
-
0031222252
-
A linear quad tree compression scheme for image encryption
-
H. K. L. Chang, and J. L. Liu, "A linear quad tree compression scheme for image encryption," Signal Processing, vol. 10, no. 4, pp. 279-290, 1997.
-
(1997)
Signal Processing
, vol.10
, Issue.4
, pp. 279-290
-
-
Chang, H.K.L.1
Liu, J.L.2
-
5
-
-
0035451781
-
A new encryption algorithm for image cryptosystems
-
C. C. Chang, M. S. Hwang, and T. S. Chen, "A new encryption algorithm for image cryptosystemsJournal of Systems and Software, vol. 58, pp. 83-91, 2001.
-
(2001)
Journal of Systems and Software
, vol.58
, pp. 83-91
-
-
Chang, C.C.1
Hwang, M.S.2
Chen, T.S.3
-
6
-
-
1342306864
-
A symmetric image encryption based on 3D chaotic maps
-
G. Chen, Y. Mao, and C.K. Chui, "A symmetric image encryption based on 3D chaotic maps," Chaos Solitons Fractals, vol. 21, pp. 749-761, 2004.
-
(2004)
Chaos Solitons Fractals
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
7
-
-
0034249821
-
Partial encryption of compressed image and videos
-
H. Cheng, and X. B. Li, "Partial encryption of compressed image and videos," IEEE Transactions on Signal Processing, vol. 48, no. 8, pp. 2439-2451, 2000.
-
(2000)
IEEE Transactions on Signal Processing
, vol.48
, Issue.8
, pp. 2439-2451
-
-
Cheng, H.1
Li, X.B.2
-
8
-
-
84875361430
-
-
D. S. A. Elminaam, H. M. A. Kader, and M. M. Hadhoud, "Evaluating the performance of symmetric encryption algorithms, vol. 10, no. 3, pp. 213-219, 2010.
-
(2010)
Evaluating the performance of symmetric encryption algorithms
, vol.10
, Issue.3
, pp. 213-219
-
-
Elminaam, D.S.A.1
Kader, H.M.A.2
Hadhoud, M.M.3
-
9
-
-
62749096566
-
Quality of encryption measurement of bitmap images with RC6MRC6, and Rijndael block cipher algorithms
-
N. E. Fishawy, and O. M. A. Zaid, "Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms," International Journal of Network Security, vol. 5, no. 3, pp. 241-251, 2007.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 241-251
-
-
Fishawy, N.E.1
Zaid, O.M.A.2
-
10
-
-
24944459842
-
Chaos-Based Image Encryption Algorithm
-
Z. H. Guan, F. Huang, and W. Guan, Chaos-Based Image Encryption Algorithm, Physics Letter A, vol. 346, pp. 153-157, 2005.
-
(2005)
Physics Letter A
, vol.346
, pp. 153-157
-
-
Guan, Z.H.1
Huang, F.2
Guan, W.3
-
11
-
-
82155196566
-
A new general transparency model for block-based watermarking method
-
F. Huang, "A new general transparency model for block-based watermarking method," International Journal of Network Security, vol. 7, no. 2, pp. 235-239, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 235-239
-
-
Huang, F.1
-
12
-
-
0032089417
-
Symmetric ciphers based on two dimensional chaotic maps
-
F. Jiri, "Symmetric ciphers based on two dimensional chaotic maps," International Journal of Bi-furcat Chaos, vol. 8, no. 6, pp. 1259-1284, 1998.
-
(1998)
International Journal of Bi-furcat Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Jiri, F.1
-
13
-
-
84875326188
-
Analysis of Venkaiah et al.'s AES design
-
J. N. Jr, "Analysis of Venkaiah et al.'s AES design," International Journal of Network Security, vol. 9, no. 3, pp. 285-289, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.3
, pp. 285-289
-
-
Jr, J.N.1
-
14
-
-
0036296858
-
Cryptanalysis of a chaotic image encryption method. symposium on circuits and systems
-
Scottsdale, AZ, USA
-
S. Li, and X. Zheng, "Cryptanalysis of a chaotic image encryption method," Proceedings of the IEEE International. symposium on circuits and systems, pp. 708-711, Scottsdale, AZ, USA, 2002.
-
(2002)
, pp. 708-711
-
-
Li, S.1
Zheng, X.2
-
15
-
-
0036404061
-
Chaotic encryption scheme for real time digital video
-
San Jose, CA, USA
-
S. Li, X. Zheng, X. Mou, and Y. Cai, "Chaotic encryption scheme for real time digital video," Proceedings of the SPIE on electronic imaging, pp. 149-160, San Jose, CA, USA, 2002.
-
(2002)
Proceedings of the SPIE on electronic imaging
, pp. 149-160
-
-
Li, S.1
Zheng, X.2
Mou, X.3
Cai, Y.4
-
16
-
-
33747058774
-
Image Encryption Using Chaotic Logistic Map
-
N. K. Pareek, V. Patidar, and K. K. Sud, Image Encryption Using Chaotic Logistic Map, Image and Vision Computing, vol. 24, pp. 926-934, 2006.
-
(2006)
Image and Vision Computing
, vol.24
, pp. 926-934
-
-
Pareek, N.K.1
Patidar, V.2
Sud, K.K.3
-
17
-
-
0029289969
-
Optical image encryption based on input plane and fourier plane random encoding
-
P. Refregier, and B. Javidi, "Optical image encryption based on input plane and fourier plane random encoding," Optics Letters, vol. 20, pp. 767-769, 1995.
-
(1995)
Optics Letters
, vol.20
, pp. 767-769
-
-
Refregier, P.1
Javidi, B.2
-
18
-
-
0000378191
-
Fast encryption of image data using chaotic Kolmogrov flow
-
J. Scharinger, "Fast encryption of image data using chaotic Kolmogrov flow," Electronic Imaging, vol. 7, no. 2, pp. 318-325, 1998.
-
(1998)
Electronic Imaging
, vol.7
, Issue.2
, pp. 318-325
-
-
Scharinger, J.1
-
19
-
-
23144450151
-
On the security of 3D cat map based symmetric image encryption scheme
-
K. Wang, W. Pei, L. Zou, A. Song, and Z. He, "On the security of 3D cat map based symmetric image encryption scheme," Physics Letter A, vol. 343, pp. 432-439, 2005.
-
(2005)
Physics Letter A
, vol.343
, pp. 432-439
-
-
Wang, K.1
Pei, W.2
Zou, L.3
Song, A.4
He, Z.5
-
21
-
-
0000635245
-
An efficient hierarchical chaotic image encryption algorithm and its VLSI realization
-
J. C. Yen, and J. I. Guo, "An efficient hierarchical chaotic image encryption algorithm and its VLSI realization," IEE Proceedings-Vision Image Processing, vol. 147, pp. 167-175, 2000.
-
(2000)
IEE Proceedings-Vision Image Processing
, vol.147
, pp. 167-175
-
-
Yen, J.C.1
Guo, J.I.2
-
22
-
-
0033681472
-
A new chaotic key based design for image encryption and decryption
-
J. C. Yen, and J. I. Guo, "A new chaotic key based design for image encryption and decryption," Proceedings of the IEEE International Symposium Circuits and Systems, vol. 4, pp. 49-52, 2000.
-
(2000)
Proceedings of the IEEE International Symposium Circuits and Systems
, vol.4
, pp. 49-52
-
-
Yen, J.C.1
Guo, J.I.2
-
23
-
-
0036452599
-
Ergodic matrix in image encryption
-
X. Y. Zhao, and G. Chen, "Ergodic matrix in image encryption," Proceedings Second International Conference on Image and Graphics, vol. 4875, pp. 394-401, 2002.
-
(2002)
Proceedings Second International Conference on Image and Graphics
, vol.4875
, pp. 394-401
-
-
Zhao, X.Y.1
Chen, G.2
|