-
1
-
-
0003851399
-
-
in C, 2nd edn., John Wiley and Sons, Inc
-
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn., John Wiley and Sons, Inc. (1996).
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code
-
-
Schneier, B.1
-
2
-
-
0003508558
-
-
Federal Information Processing Standards Publications (FIPS 197), November
-
Federal Information Processing Standards Publications (FIPS 197), Advanced Encryption Standard (AES), November (2001).
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
3
-
-
1342306864
-
A symmetric encryption scheme based on 3D chaotic cat maps
-
G. Chen, Y. Mao, and C. K. Chui, A symmetric encryption scheme based on 3D chaotic cat maps, Chaos, Solitions & Fractals 21, 749 (2004).
-
(2004)
Chaos, Solitions & Fractals
, vol.21
, pp. 749
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
4
-
-
10444257964
-
A novel fast image encryption scheme based on 3D chaotic baker maps
-
Y. Mao, G. Chen, and S. Lian, A novel fast image encryption scheme based on 3D chaotic baker maps. Int. Journal of Bifurcation and Chaos 14, 3613 (2004).
-
(2004)
Int. Journal of Bifurcation and Chaos
, vol.14
, pp. 3613
-
-
Mao, Y.1
Chen, G.2
Lian, S.3
-
5
-
-
34247623219
-
-
H. El-Din, H. Ahmed, H. M. Kalash, and O. S. Farag Allah, An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption, Informatica 31, 121 (2007).
-
(2007)
An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption, Informatica
, vol.31
, pp. 121
-
-
El-Din, H.1
Ahmed, H.2
Kalash, H.M.3
Farag Allah, O.S.4
-
6
-
-
51249102657
-
Image encryption algorithm based on chaotic mapping
-
© Universiti Teknologi Malaysia
-
M. Salleh, S. Ibrahim, and I. F. Isnin, Image encryption algorithm based on chaotic mapping. Jurnal Teknologi 39(D), 1 (2003), © Universiti Teknologi Malaysia.
-
(2003)
Jurnal Teknologi
, vol.39
, Issue.D
, pp. 1
-
-
Salleh, M.1
Ibrahim, S.2
Isnin, I.F.3
-
8
-
-
63149125847
-
-
Internet Draft, University of Waterloo, October
-
S. Thomas, D. Antony, T. Berson, and G. Gong, The W7 Stream Cipher Algorithm, Internet Draft, University of Waterloo, October (2001).
-
(2001)
The W7 Stream Cipher Algorithm
-
-
Thomas, S.1
Antony, D.2
Berson, T.3
Gong, G.4
-
9
-
-
84961130953
-
VLSI implementation of GSM security: A5/1 and W7 ciphers
-
Canada, May
-
G. Kostopoulos, N. Sklavos, M. D. Galanis, and O. Koufopavlou, VLSI implementation of GSM security: A5/1 and W7 ciphers, Proceedings of the IEEE Workshop on Wireless Circuits & Systems (WoWCAS' 04)., Canada, May (2004).
-
(2004)
Proceedings of the IEEE Workshop on Wireless Circuits & Systems (WoWCAS' 04)
-
-
Kostopoulos, G.1
Sklavos, N.2
Galanis, M.D.3
Koufopavlou, O.4
-
10
-
-
62849085933
-
A modified AES based algorithm for image encryption
-
May, ISSN 1307-6884
-
M. Zehid, M. Machhout, L. Khrijji, A. Baganne, and R. Tourki, A modified AES based algorithm for image encryption, Proceedings of World Academy of Science, Engineering and Technology., May (2007), p. 21, ISSN 1307-6884.
-
(2007)
Proceedings of World Academy of Science, Engineering and Technology
, pp. 21
-
-
Zehid, M.1
MacHhout, M.2
Khrijji, L.3
Baganne, A.4
Tourki, R.5
-
11
-
-
84881264170
-
It security in biomedical imaging informatics: The hidden vulnerability
-
World Scientific Publishing Company, Singapore
-
W. S. Adam Chee, IT Security in Biomedical Imaging Informatics: The Hidden Vulnerability, Journal of Mechanics in Medicine and Biology, World Scientific Publishing Company, Singapore (2007) Vol. 7, pp. 101-106.
-
(2007)
Journal of Mechanics in Medicine and Biology
, vol.7
, pp. 101-106
-
-
Adam Chee, W.S.1
-
12
-
-
0003688173
-
-
National Electrical Manufacturers Association, Rosslyn, DICOM Committee, Virgina USA
-
D. Clunie, Digital Imaging and Communications in Medicine (DICOM), National Electrical Manufacturers Association, Rosslyn, DICOM Committee, Virgina USA (2001).
-
(2001)
Digital Imaging and Communications in Medicine (DICOM)
-
-
Clunie, D.1
-
13
-
-
33846080047
-
Managing medical images and clinical information
-
S. S. Furui, M. S. Robelo, R. A. Moreno, M. Santos, N. Bertozzo, G. H. M. B. Motta, F. A. Pires, and M. A. Guteirrez, Managing medical images and clinical information. IEEE Trans. Inf. Technol. Biomed. 11, 17 (2007).
-
(2007)
IEEE Trans. Inf. Technol. Biomed.
, vol.11
, pp. 17
-
-
Furui, S.S.1
Robelo, M.S.2
Moreno, R.A.3
Santos, M.4
Bertozzo, N.5
Motta, G.H.M.B.6
Pires, F.A.7
Guteirrez, M.A.8
-
14
-
-
34249778305
-
-
Prof. Rudko Spring, North Dartmouth, MA
-
C. Shoemaker, Rudko, Hidden Bits: A Survey of Techniques for Digital Watermarking, Independent Study, EER-290, Prof. Rudko Spring, North Dartmouth, MA (2002).
-
(2002)
Hidden Bits: A Survey of Techniques for Digital Watermarking, Independent Study, EER-290
-
-
Shoemaker Rudko, C.1
-
16
-
-
0035167458
-
Analysis of LSB based image steganography techniques
-
Thessaloniki, Greece, October
-
R. Chandramouli and N. Memon, Analysis of LSB based image steganography techniques, Proceedings of ICIP 2001., Thessaloniki, Greece, October (2001).
-
(2001)
Proceedings of ICIP 2001
-
-
Chandramouli, R.1
Memon, N.2
-
17
-
-
63149093627
-
Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes
-
J. Nayak, P. S Bhat, R. Acharya, and M. Sathish Kumar, Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. Journal of Medical Systems (Springer) 163 (2008).
-
(2008)
Journal of Medical Systems (Springer)
, pp. 163
-
-
Nayak, J.1
Bhat, P.S.2
Acharya, R.3
Sathish Kumar, M.4
-
18
-
-
77951787544
-
High speed and secure encryption schemes based on chinese reminder theorem for storage and transmission of medical information
-
G. Aital, K. N. Hari Bhat, and S. U. Acharya, High speed and secure encryption schemes based on chinese reminder theorem for storage and transmission of medical information. Journal of Mechanics in Medicine and Biology. 10, 167 (2010).
-
(2010)
Journal of Mechanics in Medicine and Biology.
, vol.10
, pp. 167
-
-
Aital, G.1
Hari Bhat, K.N.2
Acharya, S.U.3
-
22
-
-
85015402934
-
-
LNCS,218, Springer Verlag
-
V. Miller, Uses of Elliptic Curves in Cryptography, Advances in Cryptology-Crypto'85, LNCS,218, Springer Verlag (1986), pp. 417-426.
-
(1986)
Uses of Elliptic Curves in Cryptography, Advances in Cryptology-Crypto'85
, pp. 417-426
-
-
Miller, V.1
-
24
-
-
84874800178
-
A public Key cryptosystem and a signature scheme based on discrete logarithms
-
IT-31
-
T. ElGamal, A public Key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Information Theory IT-31, 469 (1985).
-
(1985)
IEEE Trans. Information Theory
, pp. 469
-
-
Elgamal, T.1
-
27
-
-
79957816695
-
Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points
-
S. V. Sathyanarayana, M. Aswatha Kumar, and K. N. Haribhat, Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points. International Journal of Network Security 12, 137 (2011).
-
(2011)
International Journal of Network Security
, vol.12
, pp. 137
-
-
Sathyanarayana, S.V.1
Aswatha Kumar, M.2
Haribhat, K.N.3
-
29
-
-
84889062986
-
Building cyclic elliptic curves modulo large primes
-
F. Morain, Building Cyclic Elliptic Curves Modulo Large Primes. Lecture Notes in Computer Science 547, 328 (1990).
-
(1990)
Lecture Notes in Computer Science
, vol.547
, pp. 328
-
-
Morain, F.1
-
30
-
-
77956447858
-
A novel pseudo random bit generator for cryptography applications
-
R. Mita, G. Paumba, S. Pennisi, and M. Poli, A novel pseudo random bit generator for cryptography applications, 9th International Conference on 15-18 (2002), Vol. 2, pp. 489-492.
-
(2002)
9th International Conference on 15-18
, vol.2
, pp. 489-492
-
-
Mita, R.1
Paumba, G.2
Pennisi, S.3
Poli, M.4
-
31
-
-
0003822632
-
-
NIST Special Publication, US, May
-
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, Alan Heckert, J. Dray, and San Vo, A Statistical Test Suite For Random And Pseudorandom Number Generators For Cryptographic Applications, NIST Special Publication, US, May (2001), pp. 800-22.
-
(2001)
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
, pp. 800-822
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
-
32
-
-
31344462815
-
Block ciphers and stream ciphers: The state of the art
-
Belgium
-
A. Biryukov, Block Ciphers and Stream Ciphers: The State of the Art, Technical report, http://www.esat.kuleuven.ac.be, Belgium (2006).
-
(2006)
Technical Report
-
-
Biryukov, A.1
|