Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p)
暂无分享,去创建一个
M. Aswatha Kumar | S. V. Sathyanarayana | K. N. Hari Bhat | K. Bhat | S. Sathyanarayana | M. A. Kumar
[1] Fred Piper,et al. Stream Ciphers , 1982, EUROCRYPT.
[2] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[3] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[4] Guang Gong,et al. Elliptic Curve Pseudorandom Sequence Generators , 1999, Selected Areas in Cryptography.
[5] M. Aswatha Kumar,et al. Generation of pseudorandom sequence over elliptic curve group and their properties , 2007 .
[6] Alex Biryukov,et al. Block Ciphers and Stream Ciphers: The State of the Art , 2004, IACR Cryptol. ePrint Arch..
[7] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[8] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[9] Guanrong Chen,et al. Chaos-Based Encryption for Digital Images and Videos , 2004 .
[10] Garrett Birkhoff,et al. A survey of modern algebra , 1942 .
[11] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[12] Andreas Klein. Stream Ciphers , 2013 .
[13] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[14] Ismail Amr Ismail,et al. A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..
[15] Rehan Akbani,et al. Elliptic curve cryptosystem and its applications , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[16] G. Mullen,et al. Primitive polynomials over finite fields , 1992 .
[17] Abhijit Mitra,et al. A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .
[18] R. A. Rueppel. Analysis and Design of Stream Ciphers , 2012 .
[19] J. Hadamard,et al. Les surfaces a courbures opposees et leurs lignes geodesique , 1898 .
[20] M. I. Youssef,et al. Chaotic Sequences Implementations on Residue Number Spread Spectrum System , .
[21] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[22] Canyan Zhu,et al. Image encryption algorithm based on chaotic mapping , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[23] Osama S. Faragallah,et al. An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.
[24] J. Rotman. Advanced Modern Algebra , 2002 .
[25] S. D. Dhodapkar,et al. CHAOS BASED CRYPTOGRAPHY : A NEW APPROACH TO SECURE COMMUNICATIONS , 2005 .
[26] Rached Tourki,et al. A Modified AES Based Algorithm for Image Encryption , 2007 .
[27] Gaetano Palumbo,et al. A novel pseudo random bit generator for cryptography applications , 2002, 9th International Conference on Electronics, Circuits and Systems.
[28] Luigi Fortuna,et al. Does chaos work better than noise , 2002 .
[29] Henry Beker,et al. Cipher Systems: The Protection of Communications , 1982 .
[30] Zhijie Jerry Shi,et al. Software Implementations of Elliptic Curve Cryptography , 2008, Int. J. Netw. Secur..
[31] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[32] M. Aswatha Kumar,et al. Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. , 2011 .
[33] Vinod Patidar,et al. A Random Bit Generator Using Chaotic Maps , 2010, Int. J. Netw. Secur..
[34] Kwok-Wo Wong,et al. A random number generator based on elliptic curve operations , 2004 .
[35] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[36] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[37] Michael Purser. Introduction to error-correcting codes , 1994 .
[38] William Stallings. Network and Internetwork Security: Principles and Practice , 1994 .