-
1
-
-
85010422698
-
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
-
M. S. Farash et al., "A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security, '' Int. J. Commun. Syst., vol. 30, no. 4, p. e3019, 2017, doi: 10.1002/dac.3019.
-
(2017)
Int. J. Commun. Syst
, vol.30
, Issue.4
, pp. e3019
-
-
Farash, M.S.1
-
2
-
-
84995810068
-
A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud
-
May
-
G. Hu, D. Xiao, T. Xiang, S. Bai, and Y. Zhang, "A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud, '' Inf. Sci., vol. 387, pp. 132-145, May 2017.
-
(2017)
Inf. Sci
, vol.387
, pp. 132-145
-
-
Hu, G.1
Xiao, D.2
Xiang, T.3
Bai, S.4
Zhang, Y.5
-
3
-
-
84994514374
-
-
Hershey, PA, USA: IGI Global
-
B. Gupta, D. P. Agrawal, and S. Yamaguchi, Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. Hershey, PA, USA: IGI Global, 2016.
-
(2016)
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
-
-
Gupta, B.1
Agrawal, D.P.2
Yamaguchi, S.3
-
4
-
-
85018496108
-
Bi-level semantic representation analysis for multimedia event detection
-
May
-
X. Chang, Z. Ma, Y. Yang, Z. Zeng, and A. G. Hauptmann, "Bi-level semantic representation analysis for multimedia event detection, '' IEEE Trans. Cybern., vol. 47, no. 5, pp. 1180-1197, May 2017.
-
(2017)
IEEE Trans. Cybern
, vol.47
, Issue.5
, pp. 1180-1197
-
-
Chang, X.1
Ma, Z.2
Yang, Y.3
Zeng, Z.4
Hauptmann, A.G.5
-
5
-
-
84961880610
-
An open-switch fault diagnosis method for single-phase PWM rectifier using a model-based approach in high-speed railway electrical traction drive system
-
May
-
B. Gou, X. Ge, S. Wang, X. Feng, J. B. Kuo, and T. G. Habetler, "An open-switch fault diagnosis method for single-phase PWM rectifier using a model-based approach in high-speed railway electrical traction drive system, '' IEEE Trans. Power Electron., vol. 31, no. 5, pp. 3816-3826, May 2016.
-
(2016)
IEEE Trans. Power Electron
, vol.31
, Issue.5
, pp. 3816-3826
-
-
Gou, B.1
Ge, X.2
Wang, S.3
Feng, X.4
Kuo, J.B.5
Habetler, T.G.6
-
6
-
-
51249085821
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, '' J. Cryptol., vol. 21, no. 4, pp. 469-491, 2008.
-
(2008)
J. Cryptol
, vol.21
, Issue.4
, pp. 469-491
-
-
Bellare, M.1
Namprempre, C.2
-
7
-
-
84979815252
-
Cloud-Assisted IoT-based SCADA systems security: A review of the state of the art and future challenges
-
A. Sajid, H. Abbas, and K. Saleem, "Cloud-Assisted IoT-based SCADA systems security: A review of the state of the art and future challenges, '' IEEE Access, vol. 4, pp. 1375-1384, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 1375-1384
-
-
Sajid, A.1
Abbas, H.2
Saleem, K.3
-
8
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
G. Alvarez and S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems, '' Int. J. Bifurcation Chaos, vol. 16, no. 8, pp. 2129-2151, 2006.
-
(2006)
Int. J. Bifurcation Chaos
, vol.16
, Issue.8
, pp. 2129-2151
-
-
Alvarez, G.1
Li, S.2
-
9
-
-
84897087054
-
Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata
-
Sep
-
K. M. Faraoun, "Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata, '' Commun. Nonlin-ear Sci. Numer. Simul., vol. 19, no. 9, pp. 3136-3148, Sep. 2014.
-
(2014)
Commun. Nonlin-ear Sci. Numer. Simul
, vol.19
, Issue.9
, pp. 3136-3148
-
-
Faraoun, K.M.1
-
10
-
-
33846348219
-
Chaotic keyed hash function based on feedforwardfifeedback nonlinear digital filter
-
J. Zhang, X. Wang, and W. Zhang, "Chaotic keyed hash function based on feedforwardfifeedback nonlinear digital filter, '' Phys. Lett. A, vol. 362, no. 5, pp. 439-448, 2007.
-
(2007)
Phys. Lett. A
, vol.362
, Issue.5
, pp. 439-448
-
-
Zhang, J.1
Wang, X.2
Zhang, W.3
-
11
-
-
85028013504
-
Anovel color image encryption scheme using rectangular transform-enhanced chaotic tent maps
-
X. Wu, B. Zhu, Y. Hu, andY. Ran, "Anovel color image encryption scheme using rectangular transform-enhanced chaotic tent maps, '' IEEE Access, vol. 5, pp. 6429-6436, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 6429-6436
-
-
Wu, X.1
Zhu, B.2
Hu Andy Ran, Y.3
-
12
-
-
85013777098
-
Sliding mode control design for synchronization of fractional order chaotic systems and its application to a new cryptosystem
-
Mar
-
P. Muthukumar, P. Balasubramaniam, and K. Ratnavelu, "Sliding mode control design for synchronization of fractional order chaotic systems and its application to a new cryptosystem, '' Int. J. Dyn. Control, vol. 5, no. 1, pp. 115-123, Mar. 2017.
-
(2017)
Int. J. Dyn. Control
, vol.5
, Issue.1
, pp. 115-123
-
-
Muthukumar, P.1
Balasubramaniam, P.2
Ratnavelu, K.3
-
13
-
-
85006716769
-
A colour byte scrambling technique for efficient image encryption based on combined chaotic map: Image encryption using combined chaotic map
-
Mar
-
M. Y. M. Parvees, J. A. Samath, I. K. Raj, and B. P. Bose, "A colour byte scrambling technique for efficient image encryption based on combined chaotic map: Image encryption using combined chaotic map, '' in Proc. Int. Conf. Elect., Electron., Optim. Technol. (ICEEOT), Mar. 2016, pp. 1067-1072.
-
(2016)
Proc. Int. Conf. Elect. Electron. Optim. Technol. (ICEEOT
, pp. 1067-1072
-
-
Parvees, M.Y.M.1
Samath, J.A.2
Raj, I.K.3
Bose, B.P.4
-
14
-
-
84950900200
-
On the derivation of a 'chaotic' encryption algorithm
-
Jan
-
R. Matthews, "On the derivation of a 'chaotic' encryption algorithm, '' Cryptologia, vol. 13, no. 1, pp. 29-42, Jan. 1989.
-
(1989)
Cryptologia
, vol.13
, Issue.1
, pp. 29-42
-
-
Matthews, R.1
-
15
-
-
84871976249
-
An efficient approach for the construction of LFT S-boxes using chaotic logistic map
-
Oct
-
I. Hussain, T. Shah, M. A. Gondal, and H. Mahmood, "An efficient approach for the construction of LFT S-boxes using chaotic logistic map, '' Nonlinear Dyn., vol. 71, nos. 1-2, pp. 133-140, Oct. 2012.
-
(2012)
Nonlinear Dyn.
, vol.71
, Issue.1-2
, pp. 133-140
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
16
-
-
84865615382
-
A fast and efficient chaos-based keyed hash function
-
A. Kanso and M. Ghebleh, "A fast and efficient chaos-based keyed hash function, '' Commun. Nonlinear Sci. Numer. Simul., vol. 18, no. 1, pp. 109-123, 2013.
-
(2013)
Commun. Nonlinear Sci. Numer. Simul.
, vol.18
, Issue.1
, pp. 109-123
-
-
Kanso, A.1
Ghebleh, M.2
-
17
-
-
84944037777
-
An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice
-
Jan
-
R. Liang, X. Tan, H. Zhou, and S. Wang, "An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice, '' Pramana, vol. 85, no. 4, pp. 617-627, Jan. 2015.
-
(2015)
Pramana
, vol.85
, Issue.4
, pp. 617-627
-
-
Liang, R.1
Tan, X.2
Zhou, H.3
Wang, S.4
-
18
-
-
84884206938
-
Secure chaotic system with application to chaotic ciphers
-
Feb
-
X. Wang, W. Zhang, W. Guo, and J. Zhang, "Secure chaotic system with application to chaotic ciphers, '' Inf. Sci., vol. 221, pp. 555-570, Feb. 2013.
-
(2013)
Inf. Sci
, vol.221
, pp. 555-570
-
-
Wang, X.1
Zhang, W.2
Guo, W.3
Zhang, J.4
-
19
-
-
0036123125
-
Cryptosystems with discretized chaotic maps
-
Jan
-
N. Masuda and K. Aihara, "Cryptosystems with discretized chaotic maps, '' IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 49, no. 1, pp. 28-40, Jan. 2002.
-
(2002)
IEEE Trans. Circuits Syst. I, Fundam. Theory Appl
, vol.49
, Issue.1
, pp. 28-40
-
-
Masuda, N.1
Aihara, K.2
-
21
-
-
34248393950
-
Theory and practice of chaotic cryptography
-
Jun
-
J. M. Amigó, L. Kocarev, and J. Szczepanski, "Theory and practice of chaotic cryptography, '' Phys. Lett. A, vol. 366, no. 3, pp. 211-216, Jun. 2007.
-
(2007)
Phys. Lett. A
, vol.366
, Issue.3
, pp. 211-216
-
-
Amigó, J.M.1
Kocarev, L.2
Szczepanski, J.3
-
22
-
-
84949230440
-
A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis
-
S. Tavares and H. Meijer, Eds. Berlin, Germany Springer Aug
-
M. Kanda, Y. Takashima, T. Matsumoto, K. Aoki, and K. Ohta, "A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis, '' in Selected Areas in Cryptogra-phy (Lecture Notes in Computer Science), vol. 1556, S. Tavares and H. Meijer, Eds. Berlin, Germany: Springer, Aug. 1998, pp. 264-279. [Online]. Available: https://link.springer.com/book/10.1007/3-540-48892-8#page=274
-
(1998)
Selected Areas in Cryptogra-phy (Lecture Notes in Computer Science)
, vol.1556
, pp. 264-279
-
-
Kanda, M.1
Takashima, Y.2
Matsumoto, T.3
Aoki, K.4
Ohta, K.5
-
23
-
-
0032665874
-
On the security of iterated message authentication codes
-
Jan
-
B. Preneel and P. C. Van Oorschot, "On the security of iterated message authentication codes, '' IEEE Trans. Inf. Theory, vol. 45, no. 1, pp. 188-199, Jan. 1999.
-
(1999)
IEEE Trans. Inf. Theory
, vol.45
, Issue.1
, pp. 188-199
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
25
-
-
50149106526
-
Efficient and High-Throughput Implementations of AES-GCM on FPGAS
-
Dec
-
G. Zhou, H. Michalik, and L. Hinsenkamp, "Efficient and High-Throughput Implementations of AES-GCM on FPGAs, '' in Proc. Int. Conf. Field-Programm. Technol. (ICFPT), Dec. 2007, pp. 185-192.
-
(2007)
Proc. Int. Conf. Field-Programm. Technol. (ICFPT
, pp. 185-192
-
-
Zhou, G.1
Michalik, H.2
Hinsenkamp, L.3
-
26
-
-
0242571721
-
Helix: Fast encryption and authentication in a single cryptographic primitive
-
T. Johansson, Ed. Berlin, Germany Springer
-
N. Ferguson, D. Whiting, B. Schneier, J. Kelsey, S. Lucks, and T. Kohno, "Helix: Fast encryption and authentication in a single cryptographic primitive, '' in Fast Softw. Encryption (Lecture Notes in Computer Science), vol. 2887, T. Johansson, Ed. Berlin, Germany: Springer, 2003, pp. 330-346. [Online]. Available: https://link.springer.com/book/10.1007/b93938#page=340
-
(2003)
Fast Softw. Encryption (Lecture Notes in Computer Science)
, vol.2887
, pp. 330-346
-
-
Ferguson, N.1
Whiting, D.2
Schneier, B.3
Kelsey, J.4
Lucks, S.5
Kohno, T.6
|