A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods
暂无分享,去创建一个
[1] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[2] Y. Hilewitz,et al. Comparing fast implementations of bit permutation instructions , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[3] Ruby B. Lee,et al. Efficient permutation instructions for fast software cryptography , 2001 .
[4] Borko Furht,et al. Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[5] X. Liao,et al. A novel block cryptosystem based on iterating a chaotic map , 2006 .
[6] Sang Tao,et al. Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .
[7] Leon O. Chua,et al. Cryptography based on chaotic systems , 1997 .
[8] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[9] Safwan El Assad,et al. DIGITAL CHAOTIC CODEC FOR DS-CDMA COMMUNICATION SYSTEMS , 2006 .
[10] M. Ali,et al. Chaotic Communications, their applications and advantages over traditional methods of communication , 2008, 2008 6th International Symposium on Communication Systems, Networks and Digital Signal Processing.
[11] A. Jantan,et al. An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption , 2008 .
[12] Di Xiao,et al. Analysis and improvement of a chaos-based image encryption algorithm , 2009 .
[13] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[14] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[15] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[16] Ruby B. Lee,et al. Bit permutation instructions for accelerating software cryptography , 2000, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors.
[17] Ljupco Kocarev,et al. Discrete Chaos-I: Theory , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[18] Safwan El Assad,et al. Comparative Study of 1-D Chaotic Generators for Digital Data Encryption , 2008 .
[19] X. Mou,et al. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .
[20] Jamal Daafouz,et al. A connection between chaotic and conventional cryptography , 2008, IEEE Transactions on Circuits and Systems I: Regular Papers.