-
1
-
-
84870957968
-
-
FIPS PUB 140-1: Security Requirements for Cryptographic Modules, 1994
-
FIPS PUB 140-1: Security Requirements for Cryptographic Modules, 1994.
-
-
-
-
2
-
-
84870974256
-
-
FIPS PUB 46: Data Encryption Standard, 1999
-
FIPS PUB 46: Data Encryption Standard, 1999.
-
-
-
-
3
-
-
84870964996
-
-
FIPS PUB 197: Avdanced Encryption Standard, 2001
-
FIPS PUB 197: Avdanced Encryption Standard, 2001.
-
-
-
-
4
-
-
84870964931
-
-
FIPS PUB140-2: Security Requirements for Cryptographic Modules, 2001
-
FIPS PUB140-2: Security Requirements for Cryptographic Modules, 2001.
-
-
-
-
6
-
-
78651457419
-
A novel scheme for image encryption based on 2d piecewise chaotic maps
-
A. Akhshani, S. Behnia, A. Akhavan, H.A. Hassan, and Z. Hassan A novel scheme for image encryption based on 2d piecewise chaotic maps Optics Communications 283 2010 3259 3266
-
(2010)
Optics Communications
, vol.283
, pp. 3259-3266
-
-
Akhshani, A.1
Behnia, S.2
Akhavan, A.3
Hassan, H.A.4
Hassan, Z.5
-
7
-
-
84953635000
-
Description of a new variable-length key, 64-bit block cipher (blowfish)
-
Springer Berlin/Heidelberg
-
R. Anderson, and B. Schneier Description of a new variable-length key, 64-bit block cipher (blowfish) Lecture Notes in Computer Science vol. 809 1994 Springer Berlin/Heidelberg 191 204
-
(1994)
Lecture Notes in Computer Science
, vol.809
, pp. 191-204
-
-
Anderson, R.1
Schneier, B.2
-
8
-
-
33751380830
-
On the Shannon measure of entropy
-
P. Arora On the Shannon measure of entropy Information Sciences 23 1981 1 9
-
(1981)
Information Sciences
, vol.23
, pp. 1-9
-
-
Arora, P.1
-
10
-
-
0039972924
-
The computer generation of poisson random variables
-
A. Atkinson The computer generation of poisson random variables Applied Statistics 28 1979 29 35
-
(1979)
Applied Statistics
, vol.28
, pp. 29-35
-
-
Atkinson, A.1
-
11
-
-
0242487633
-
Cryptanalysis of sober-t32
-
T. Johansson, Lecture Notes in Computer Science Springer Berlin, Heidelberg
-
S. Babbage, C. De Cannière, J. Lano, B. Preneel, and J. Vandewalle Cryptanalysis of sober-t32 T. Johansson, Fast Software Encryption Lecture Notes in Computer Science vol. 2887 2003 Springer Berlin, Heidelberg 111 128
-
(2003)
Fast Software Encryption
, vol.2887
, pp. 111-128
-
-
Babbage, S.1
De Cannière, C.2
Lano, J.3
Preneel, B.4
Vandewalle, J.5
-
12
-
-
34548590193
-
A novel algorithm for image encryption based on mixture of chaotic maps
-
S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan A novel algorithm for image encryption based on mixture of chaotic maps Chaos, Solitons and Fractals 35 2008 408 419
-
(2008)
Chaos, Solitons and Fractals
, vol.35
, pp. 408-419
-
-
Behnia, S.1
Akhshani, A.2
Mahmodi, H.3
Akhavan, A.4
-
13
-
-
0000326312
-
Picture data encryption using scan patterns
-
N. Bourbakis, and C. Alexopoulos Picture data encryption using scan patterns Pattern Recognition 25 1992 567 581
-
(1992)
Pattern Recognition
, vol.25
, pp. 567-581
-
-
Bourbakis, N.1
Alexopoulos, C.2
-
14
-
-
0042522792
-
Scan-based compression-encryption-hiding for video on demand
-
N. Bourbakis, and A. Dollas Scan-based compression-encryption-hiding for video on demand IEEE Multimedia 10 2003 79 87
-
(2003)
IEEE Multimedia
, vol.10
, pp. 79-87
-
-
Bourbakis, N.1
Dollas, A.2
-
15
-
-
84862802660
-
Personalized information encryption using ecg signals with chaotic functions
-
C. Chen, C. Lin, C. Chiang, and S. Lin Personalized information encryption using ecg signals with chaotic functions Information Sciences 193 2012 125 140
-
(2012)
Information Sciences
, vol.193
, pp. 125-140
-
-
Chen, C.1
Lin, C.2
Chiang, C.3
Lin, S.4
-
16
-
-
1342306864
-
A symmetric image encryption scheme based on 3d chaotic cat maps
-
G. Chen, Y. Mao, and C.K. Chui A symmetric image encryption scheme based on 3d chaotic cat maps Chaos, Solitons and Fractals 21 2004 749 761
-
(2004)
Chaos, Solitons and Fractals
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
17
-
-
84860311821
-
Cross-entropy measure of uncertain variables
-
X. Chen, S. Kar, and D.A. Ralescu Cross-entropy measure of uncertain variables Information Sciences 201 2012 53 60
-
(2012)
Information Sciences
, vol.201
, pp. 53-60
-
-
Chen, X.1
Kar, S.2
Ralescu, D.A.3
-
18
-
-
38249002658
-
The computer generation of multinomial random variates
-
C. Davis The computer generation of multinomial random variates Computational Statistics & Data Analysis 16 1993 205 217
-
(1993)
Computational Statistics & Data Analysis
, vol.16
, pp. 205-217
-
-
Davis, C.1
-
21
-
-
0001130079
-
The characterization of a measure of information discrepancy
-
W. Fang The characterization of a measure of information discrepancy Information Sciences 125 2000 207 232
-
(2000)
Information Sciences
, vol.125
, pp. 207-232
-
-
Fang, W.1
-
22
-
-
37549014203
-
A new image encryption algorithm based on hyper-chaos
-
T. Gao, and Z. Chen A new image encryption algorithm based on hyper-chaos Physics Letters A 372 2008 394 400
-
(2008)
Physics Letters A
, vol.372
, pp. 394-400
-
-
Gao, T.1
Chen, Z.2
-
24
-
-
0025503132
-
A review of pseudorandom number generators
-
F. James A review of pseudorandom number generators Computer Physics Communications 60 1990 329 344
-
(1990)
Computer Physics Communications
, vol.60
, pp. 329-344
-
-
James, F.1
-
29
-
-
33845402246
-
A fast image encryption system based on chaotic maps with finite precision representation
-
H.S. Kwok, and W.K.S. Tang A fast image encryption system based on chaotic maps with finite precision representation Chaos, Solitons and Fractals 32 2007 1518 1529
-
(2007)
Chaos, Solitons and Fractals
, vol.32
, pp. 1518-1529
-
-
Kwok, H.S.1
Tang, W.K.S.2
-
32
-
-
34548361693
-
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
-
C. Li, S. Li, G. Alvarez, G. Chen, and K. Lo Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations Physics Letters A 369 2007 23 30
-
(2007)
Physics Letters A
, vol.369
, pp. 23-30
-
-
Li, C.1
Li, S.2
Alvarez, G.3
Chen, G.4
Lo, K.5
-
33
-
-
7644243295
-
Baptista-type chaotic cryptosystems: Problems and countermeasures
-
S. Li, G. Chen, K. Wong, X. Mou, and Y. Cai Baptista-type chaotic cryptosystems: problems and countermeasures Physics Letters A 332 2004 368 375
-
(2004)
Physics Letters A
, vol.332
, pp. 368-375
-
-
Li, S.1
Chen, G.2
Wong, K.3
Mou, X.4
Cai, Y.5
-
34
-
-
60349131840
-
A new measure of image scrambling degree based on grey level difference and information entropy
-
Washington, DC, USA
-
X. Li, A new measure of image scrambling degree based on grey level difference and information entropy, in: Proceedings of the 2008 International Conference on Computational Intelligence and Security, vol. 01, Washington, DC, USA, pp. 350-354.
-
Proceedings of the 2008 International Conference on Computational Intelligence and Security
, vol.1
, pp. 350-354
-
-
Li, X.1
-
35
-
-
77955280918
-
A novel image encryption algorithm based on self-adaptive wave transmission
-
X. Liao, S. Lai, and Q. Zhou A novel image encryption algorithm based on self-adaptive wave transmission Signal Processing 90 2010 2714 2722
-
(2010)
Signal Processing
, vol.90
, pp. 2714-2722
-
-
Liao, X.1
Lai, S.2
Zhou, Q.3
-
36
-
-
84861829856
-
Local measures of information storage in complex distributed computation
-
J. Lizier, M. Prokopenko, and A. Zomaya Local measures of information storage in complex distributed computation Information Sciences 208 2012 39 54
-
(2012)
Information Sciences
, vol.208
, pp. 39-54
-
-
Lizier, J.1
Prokopenko, M.2
Zomaya, A.3
-
38
-
-
17444411549
-
Efficient encryption of wavelet-based coded color images
-
K. Martin, R. Lukac, and K.N. Plataniotis Efficient encryption of wavelet-based coded color images Pattern Recognition 38 2005 1111 1115
-
(2005)
Pattern Recognition
, vol.38
, pp. 1111-1115
-
-
Martin, K.1
Lukac, R.2
Plataniotis, K.N.3
-
42
-
-
77958071180
-
Image encryption and chaotic cellular neural network
-
J. Peng, and D. Zhang Image encryption and chaotic cellular neural network Machine Learning in Cyber Trust 2009 183 213
-
(2009)
Machine Learning in Cyber Trust
, pp. 183-213
-
-
Peng, J.1
Zhang, D.2
-
43
-
-
77952354675
-
A block cipher based pseudo random number generator secure against side-channel key recovery
-
New York, NY, USA
-
C. Petit, F.X. Standaert, O. Pereira, T.G. Malkin, M. Yung, A block cipher based pseudo random number generator secure against side-channel key recovery, in: Proceedings of the 2008 ACM symposium on Information, computer and communications security, ASIACCS '08, ACM, New York, NY, USA, 2008, pp. 56-65.
-
(2008)
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08, ACM
, pp. 56-65
-
-
Petit, C.1
Standaert, F.X.2
Pereira, O.3
Malkin, T.G.4
Yung, M.5
-
47
-
-
84856043672
-
A mathematical theory of communication
-
pp. 623-656
-
C.E. Shannon A mathematical theory of communication Bell System Technical Journal 27 1948 379 423 pp. 623-656
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
48
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E. Shannon Communication theory of secrecy systems Bell System Technical Journal 28 1949 656 715
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
49
-
-
84870065054
-
A color image encryption algorithm based on magic cube transformation and modular arithmetic operation
-
J. Shen, X. Jin, and C. Zhou A color image encryption algorithm based on magic cube transformation and modular arithmetic operation Advances in Mulitmedia Information Processing - PCM 2005 2005 270 280
-
(2005)
Advances in Mulitmedia Information Processing - PCM
, vol.2005
, pp. 270-280
-
-
Shen, J.1
Jin, X.2
Zhou, C.3
-
51
-
-
12444256788
-
Statistical testing of random number generators
-
NIST Gaithersburg, MD
-
J. Soto, Statistical testing of random number generators, in: Proceedings of the 22nd National Information Systems Security Conference, vol. 10, NIST Gaithersburg, MD, p. 99.
-
Proceedings of the 22nd National Information Systems Security Conference
, vol.10
, pp. 99
-
-
Soto, J.1
-
54
-
-
40949103108
-
Image encryption with compound chaotic sequence cipher shifting dynamically
-
X. Tong, and M. Cui Image encryption with compound chaotic sequence cipher shifting dynamically Image and Vision Computing 26 2008 843 850
-
(2008)
Image and Vision Computing
, vol.26
, pp. 843-850
-
-
Tong, X.1
Cui, M.2
-
55
-
-
57749200497
-
Image encryption scheme based on 3d baker with dynamical compound chaotic sequence cipher generator
-
X. Tong, and M. Cui Image encryption scheme based on 3d baker with dynamical compound chaotic sequence cipher generator Signal Processing 89 2009 480 491
-
(2009)
Signal Processing
, vol.89
, pp. 480-491
-
-
Tong, X.1
Cui, M.2
-
56
-
-
84958598390
-
Cryptanalysis of the cellular message encryption algorithm
-
B. Kaliski, Lecture Notes in Computer Science Springer Berlin/Heidelberg
-
D. Wagner, B. Schneier, and J. Kelsey Cryptanalysis of the cellular message encryption algorithm B. Kaliski, Advances in Cryptology CRYPTO '97 Lecture Notes in Computer Science vol. 1294 1997 Springer Berlin/Heidelberg 526 537
-
(1997)
Advances in Cryptology CRYPTO '97
, vol.1294
, pp. 526-537
-
-
Wagner, D.1
Schneier, B.2
Kelsey, J.3
-
59
-
-
84862145700
-
Npcr and uaci randomness tests for image encryption, Cyber Journals: Multidisciplinary Journals in Science and Technology
-
Y. Wu, J.P. Noonan, and S. Agaian Npcr and uaci randomness tests for image encryption, Cyber Journals: Multidisciplinary Journals in Science and Technology Journal of Selected Areas in Telecommunications (JSAT) 2011 31 38
-
(2011)
Journal of Selected Areas in Telecommunications (JSAT)
, pp. 31-38
-
-
Wu, Y.1
Noonan, J.P.2
Agaian, S.3
-
60
-
-
79953695082
-
Image encryption using the sudoku matrix
-
SPIE, Orlando, Florida, USA
-
Y. Wu, Y. Zhou, J.P. Noonan, K. Panetta, S. Agaian, Image encryption using the sudoku matrix, in: Mobile Multimedia/Image Processing, Security, and Applications 2010, vol. 7708, SPIE, Orlando, Florida, USA, 2010, pp. 77080P-12.
-
(2010)
Mobile Multimedia/Image Processing, Security, and Applications 2010
, vol.7708
-
-
Wu, Y.1
Zhou, Y.2
Noonan, J.P.3
Panetta, K.4
Agaian, S.5
-
62
-
-
33947638872
-
A new measurement for image encryption effect
-
X.Y. Yu, J. Zhang, H.E. Ren, S. Li, and X.D. Zhang A new measurement for image encryption effect Journal of Physics: Conference Series 48 2006 408 411
-
(2006)
Journal of Physics: Conference Series
, vol.48
, pp. 408-411
-
-
Yu, X.Y.1
Zhang, J.2
Ren, H.E.3
Li, S.4
Zhang, X.D.5
-
64
-
-
77956340168
-
Image encryption using DNA addition combining with chaotic maps
-
Q. Zhang, L. Guo, and X. Wei Image encryption using DNA addition combining with chaotic maps Mathematical and Computer Modelling 52 2010 2028 2035
-
(2010)
Mathematical and Computer Modelling
, vol.52
, pp. 2028-2035
-
-
Zhang, Q.1
Guo, L.2
Wei, X.3
-
66
-
-
79251594543
-
A chaos-based symmetric image encryption scheme using a bit-level permutation
-
Z.l. Zhu, W. Zhang, K.w. Wong, and H. Yu A chaos-based symmetric image encryption scheme using a bit-level permutation Information Sciences 181 2011 1171 1186
-
(2011)
Information Sciences
, vol.181
, pp. 1171-1186
-
-
Z, L.Z.1
Zhang, W.2
K, W.W.3
Yu, H.4
|