A new algorithm for the construction of substitution box by using chaotic map
暂无分享,去创建一个
[1] Chuandong Li,et al. A DNA-based security solution using aggregated chaos cross and cubic map , 2016, Int. Arab J. Inf. Technol..
[2] Iqtadar Hussain,et al. A Novel Method to Identify Initial Values of Chaotic Maps in Cybersecurity , 2019, Symmetry.
[3] Aslam Muhammad,et al. A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map , 2018, Secur. Commun. Networks.
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[5] Yi-Ping Phoebe Chen,et al. Designing secure substitution boxes based on permutation of symmetric group , 2019, Neural Computing and Applications.
[6] Ibrahim Sogukpinar,et al. Analysis and Comparison of Image Encryption Algorithms , 2007 .
[7] Tariq Shah,et al. A novel construction of substitution box using a combination of chaotic maps with improved chaotic range , 2017, Nonlinear Dynamics.
[8] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[9] Mohammed Yakoob Siyal,et al. A Noisy Channel Tolerant Image Encryption Scheme , 2014, Wireless Personal Communications.
[10] Dawei Wang,et al. A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .
[11] Amir Anees,et al. An Image Encryption Scheme Based on Lorenz System for Low Profile Applications , 2015 .
[12] Tariq Shah,et al. Construction of new substitution boxes using linear fractional transformation and enhanced chaos , 2019, Chinese Journal of Physics.
[13] Arslan Shafique,et al. Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps , 2018, The European Physical Journal Plus.
[14] Amir Anees,et al. Analysis of optimized signal processing algorithms for smart antenna system , 2012, Neural Computing and Applications.
[15] Iqtadar Hussain,et al. Image encryption based on Chebyshev chaotic map and S8 S-boxes , 2019 .
[16] Yuling Luo,et al. A perturbation method to the tent map based on Lyapunov exponent and its application , 2015 .
[17] Zeeshan Ahmed,et al. A Technique for Designing Substitution Box Based on Van der Pol Oscillator , 2015, Wirel. Pers. Commun..
[18] Baodian Wei,et al. An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[19] Tariq Shah,et al. A scheme based on algebraic and chaotic structures for the construction of substitution box , 2019, Multimedia Tools and Applications.
[20] Adil Masood Siddiqui,et al. A technique for digital watermarking in combined spatial and transform domains using chaotic maps , 2013, 2013 2nd National Conference on Information Assurance (NCIA).
[21] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[22] Adil Masood Siddiqui,et al. Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..
[23] Iqtadar Hussain,et al. Construction of S-Box Based on Chaotic Map and Algebraic Structures , 2019, Symmetry.
[24] Eltayeb Salih Abuelyman,et al. An Optimized Implementation of the S-Box using Residues of Prime Numbers , 2008 .
[25] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[26] Pulak Mishra,et al. Mergers, Acquisitions and Export Competitive- ness: Experience of Indian Manufacturing Sector , 2012 .
[27] Pantelimon Stanica,et al. Cryptographic Boolean Functions and Applications , 2009 .
[28] Iqtadar Hussain,et al. A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps , 2018, The European Physical Journal Plus.
[29] Iqtadar Hussain,et al. Application of Mean of Absolute Deviation Method for the Selection of Best Nonlinear Component Based on Video Encryption , 2013 .
[30] Fawad Ahmed,et al. Hash-Based Authentication of Digital Images in Noisy Channels , 2015 .
[31] M. I. Moussa,et al. Image encryption based on new one-dimensional chaotic map , 2014, 2014 International Conference on Engineering and Technology (ICET).
[32] A. Lloyd. THE COUPLED LOGISTIC MAP : A SIMPLE MODEL FOR THE EFFECTS OF SPATIAL HETEROGENEITY ON POPULATION DYNAMICS , 1995 .
[33] Iqtadar Hussain,et al. A novel algorithm for thermal image encryption. , 2018, Journal of integrative neuroscience.
[34] Tariq Shah,et al. Statistical analysis of S-box in image encryption applications based on majority logic criterion , 2011 .
[35] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[36] William Stallings,et al. Cryptography and network security , 1998 .
[37] Yong Wang,et al. Analyses of SKIPJACK S-Box , 2011 .
[38] Qing Liu,et al. An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .
[39] Stefan Winkler,et al. Analysis of Public Image and Video Databases for Quality Assessment , 2012, IEEE Journal of Selected Topics in Signal Processing.
[40] Kalyani Mali,et al. A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map , 2016 .