-
1
-
-
84979073112
-
Recent developments in the design of conventional cryptographic algorithm
-
Springer-Verlag
-
B. Preneel, V. Rijmen and A. Bosselears, Recent developments in the design of conventional cryptographic algorithm, LNCS, Springer-Verlag, Vol. 1528, pp. 105-130, 1998.
-
(1998)
LNCS
, vol.1528
, pp. 105-130
-
-
Preneel, B.1
Rijmen, V.2
Bosselears, A.3
-
2
-
-
84893107930
-
A secret key cryptosystem by iterating a chaotic map
-
Apr.
-
T. Habutsu, Y. Nishio, I. Sasase and S. Mori, A secret key cryptosystem by iterating a chaotic map, Eurocrypt'91, Brighton, U.K., pp. 127-140, Apr. 1991.
-
(1991)
Eurocrypt'91, Brighton, U.K.
, pp. 127-140
-
-
Habutsu, T.1
Nishio, Y.2
Sasase, I.3
Mori, S.4
-
3
-
-
0035250017
-
Chaos and cryptography: Blocken Cryption ciphers based on chaotic maps
-
Feb.
-
G. Jakimoski and L. Kocarev, Chaos and cryptography: Blocken Cryption ciphers based on chaotic maps, IEEE Trans. Circuits Sys. I, Fundam. Theory Appl., vol. 48, no. 2, pp. 163-169, Feb. 2001.
-
(2001)
IEEE Trans. Circuits Sys. I, Fundam. Theory Appl.
, vol.48
, Issue.2
, pp. 163-169
-
-
Jakimoski, G.1
Kocarev, L.2
-
4
-
-
0035272648
-
Chaos-based random number generators- PartI: Analysis
-
Mar.
-
T. Stojanovski and L. Kocarev, Chaos-based random number generators- PartI: Analysis, IEEE Trans. Circuits Sys. I, Fundam. Theory Appl, vol. 48, no. 3, pp. 281-288, Mar. 2001.
-
(2001)
IEEE Trans. Circuits Sys. I, Fundam. Theory Appl
, vol.48
, Issue.3
, pp. 281-288
-
-
Stojanovski, T.1
Kocarev, L.2
-
5
-
-
37249092682
-
One-way hash function construction based on 2D coupled map lattices
-
Mar.
-
Y. Wang, X. Liao, D. Xiao and K. W. Wong, "One-way hash function construction based on 2D coupled map lattices," Information Sciences, vol. 178, no. 5, pp. 1391-1406, Mar. 2008
-
(2008)
Information Sciences
, vol.178
, Issue.5
, pp. 1391-1406
-
-
Wang, Y.1
Liao, X.2
Xiao, D.3
Wong, K.W.4
-
7
-
-
0032089417
-
Symmetric ciphers based on two dimensional chaotic maps
-
Fridrich, Symmetric ciphers based on two dimensional chaotic maps, Int. J. Bifurcat Chaos, vol. 8, pp. 1259-84, 1998
-
(1998)
Int. J. Bifurcat Chaos
, vol.8
, pp. 1259-1284
-
-
Fridrich1
-
9
-
-
24944459842
-
Chaos-based image encryption algorithm
-
Oct.
-
Z. H. Guan, F. Huang and W. Guan, Chaos-based image encryption algorithm, Phys. Lett. A, vol. 346, pp. 153-157, Oct. 2005.
-
(2005)
Phys. Lett. A
, vol.346
, pp. 153-157
-
-
Guan, Z.H.1
Huang, F.2
Guan, W.3
-
10
-
-
12244258246
-
An image encryption approach based on chaotic maps
-
May
-
L. Zhang, X. Liao and X. Wang, An image encryption approach based on chaotic maps, Chaos, Solitons & Fractals, vol. 24, Issue 3, pp. 759- 765, May 2005
-
(2005)
Chaos, Solitons & Fractals
, vol.24
, Issue.3
, pp. 759-765
-
-
Zhang, L.1
Liao, X.2
Wang, X.3
-
11
-
-
17644405819
-
A block cipher based on a suitable use of the chaotic standard map
-
Oct.
-
S. Lian, J. Sun, Z. q. Wang, A block cipher based on a suitable use of the chaotic standard map, Chaos, Solitons and Fractals, Vol. 26, pp. 117-129, Oct. 2005.
-
(2005)
Chaos, Solitons and Fractals
, vol.26
, pp. 117-129
-
-
Lian, S.1
Sun, J.2
Wang, Z.Q.3
-
12
-
-
40849137988
-
A fast image encryption scheme based on chaotic standard map
-
April
-
K. W. Wong, B. S. H. Kwok and W. S. Law, A fast image encryption scheme based on chaotic standard map, Phys. Lett. A, Vol. 372, 2645-2652, April 2008
-
(2008)
Phys. Lett. A
, vol.372
, pp. 2645-2652
-
-
Wong, K.W.1
Kwok, B.S.H.2
Law, W.S.3
-
13
-
-
2642515522
-
A steganographic scheme for secure communications based on the chaos and Euler theorem
-
June
-
D. C. Lou and C. H. Sung, A steganographic scheme for secure communications based on the chaos and Euler theorem, IEEE Trans. Multimedia, vol. 6, pp. 501-509, June 2004.
-
(2004)
IEEE Trans. Multimedia
, vol.6
, pp. 501-509
-
-
Lou, D.C.1
Sung, C.H.2
-
14
-
-
58149507777
-
Security analysis of image encryption based on two dimensional chaotic maps and improved algorithm
-
Mar.
-
F. Huang and Y. Feng, Security analysis of image encryption based on two dimensional chaotic maps and improved algorithm, Journal of Frontiers of Electrical and Electronic Engineering in China, vol. 4, no. 1, pp.5-9, Mar. 2009.
-
(2009)
Journal of Frontiers of Electrical and Electronic Engineering in China
, vol.4
, Issue.1
, pp. 5-9
-
-
Huang, F.1
Feng, Y.2
-
15
-
-
61349130629
-
Cryptanalysis of a chaos-based image encryption algorithm
-
Mar.
-
C. Cokal and E. Solak, Cryptanalysis of a chaos-based image encryption algorithm, Phys. Lett. A, vol. 373, pp. 1357, Mar. 2009.
-
(2009)
Phys. Lett. A
, vol.373
, pp. 1357
-
-
Cokal, C.1
Solak, E.2
-
16
-
-
0042786512
-
Cryptography with chaos
-
Mar.
-
M. S. Baptista, Cryptography with chaos, Phys. Lett. A, vol. 240, no. 1-2, pp. 50-54, Mar. 1998.
-
(1998)
Phys. Lett. A
, vol.240
, Issue.1-2
, pp. 50-54
-
-
Baptista, M.S.1
-
17
-
-
2442684584
-
A combined chaotic cryptographic and hashing scheme
-
Feb.
-
K. W. Wong, A combined chaotic cryptographic and hashing scheme, Phys. Lett. A, vol. 307, pp. 292-298, Feb. 2003.
-
(2003)
Phys. Lett. A
, vol.307
, pp. 292-298
-
-
Wong, K.W.1
-
18
-
-
34748845863
-
Medical Image Encryption Based on Pixel arrangement and Random Permutation for Transmission Security
-
June
-
K. Usman, H. Juzoji, I. Nakajima, S. Soegidjoko, M. Ramdhani, T. Hori and S. Igi, Medical Image Encryption Based on Pixel arrangement and Random Permutation for Transmission Security, in Proc. IEEE Conf. e- Health Networking, Application and services, pp. 244-247, June 2007.
-
(2007)
Proc. IEEE Conf. e-Health Networking, Application and Services
, pp. 244-247
-
-
Usman, K.1
Juzoji, H.2
Nakajima, I.3
Soegidjoko, S.4
Ramdhani, M.5
Hori, T.6
Igi, S.7
-
19
-
-
51949092251
-
A Modified AES Based Algorithm for Image Encryption
-
M. Zeghid, M. Machhout, L. Khriji, A. Baganne and R. Tourki, A Modified AES Based Algorithm for Image Encryption, International Journal of Computer Science and Engineering, vol.1, no.1, pp. 70-75, 2007.
-
(2007)
International Journal of Computer Science and Engineering
, vol.1
, Issue.1
, pp. 70-75
-
-
Zeghid, M.1
Machhout, M.2
Khriji, L.3
Baganne, A.4
Tourki, R.5
-
20
-
-
0037383115
-
A technique for image encryption using digital signature
-
Apr.
-
A. Sinha and K. Singh, A technique for image encryption using digital signature, Optics Communications, vol. 218, no. 4-6, Apr. 2003.
-
(2003)
Optics Communications
, vol.218
, Issue.4-6
-
-
Sinha, A.1
Singh, K.2
-
21
-
-
33750520992
-
Comment on 'A technique for image encryption using digital signature'
-
December
-
L. H. Encinas and A. P. Domnguez, Comment on 'A technique for image encryption using digital signature', Optics Communications, vol. 268, no. 2, pp. 261-265, December 2006.
-
(2006)
Optics Communications
, vol.268
, Issue.2
, pp. 261-265
-
-
Encinas, L.H.1
Domnguez, A.P.2
-
22
-
-
33846425330
-
Image security system using recursive cellular automata substitution
-
May
-
R. J. Chen and J. L. Lai, Image security system using recursive cellular automata substitution, Pattern Recognition, vol. 40, pp. 1621-1631, May 2007.
-
(2007)
Pattern Recognition
, vol.40
, pp. 1621-1631
-
-
Chen, R.J.1
Lai, J.L.2
-
23
-
-
77955280918
-
A novel image encryption algorithm based on self-adaptive wave transmission
-
Sept.
-
X. Liao, S. Lai and Q. Zhou, A novel image encryption algorithm based on self-adaptive wave transmission, Signal Processing, vol. 90, pp. 2714- 2722, Sept. 2010.
-
(2010)
Signal Processing
, vol.90
, pp. 2714-2722
-
-
Liao, X.1
Lai, S.2
Zhou, Q.3
-
24
-
-
38049027849
-
-
CRC Press, Chapter 5
-
A. J. Menezes, P. C. Van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Chapter 5, pp. 175, 1996.
-
(1996)
Handbook of Applied Cryptography
, pp. 175
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
26
-
-
33846253665
-
Multi-mode operator for SHA-2 hash functions
-
R. Glabb, L. Imbert and G. Jullien, Multi-mode operator for SHA-2 hash functions, Journal of Systems Architecture , vol. 53, no. 2-3, pp. 127-138, 2007
-
(2007)
Journal of Systems Architecture
, vol.53
, Issue.2-3
, pp. 127-138
-
-
Glabb, R.1
Imbert, L.2
Jullien, G.3
-
30
-
-
67650417888
-
Color image encryption based on coupled nonlinear chaotic map
-
Nov.
-
S. Mazloom and A. M. Eftekhari-Moghadam, Color image encryption based on coupled nonlinear chaotic map, Chaos, Solitons Fractals, vol. 42, no. 3, pp. 1745-1754, Nov. 2009.
-
(2009)
Chaos, Solitons Fractals
, vol.42
, Issue.3
, pp. 1745-1754
-
-
Mazloom, S.1
Eftekhari-Moghadam, A.M.2
|