A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher
暂无分享,去创建一个
[1] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[2] Hatem Abdelkader,et al. Securing JPEG architecture based on enhanced chaotic hill cipher algorithm , 2011, The 2011 International Conference on Computer Engineering & Systems.
[3] Komal Agrawal,et al. Elliptic Curve Cryptography with Hill Cipher Generation for Secure Text Cryptosystem , 2014 .
[4] Ganapati Panda,et al. Image Encryption Using Advanced Hill Cipher Algorithm , 2009 .
[5] Mohd Kamir Yusof,et al. Cryptography: A New Approach of Classical Hill Cipher , 2013 .
[6] Adnan Abdul-Aziz Gutub,et al. USING SUBTHRESHOLD SRAM TO DESIGN LOW-POWER CRYPTO HARDWARE , 2011 .
[7] Neha Sharma,et al. A Novel Approach to Hill Cipher , 2014 .
[8] P. Naskar,et al. A Secure Symmetric Image Encryption Based on Bit-wise Operation , 2014 .
[9] A. A-A Gutub,et al. Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[10] B Nayak. Signcryption schemes based on elliptic curve cryptography , 2014 .
[11] Lester S. Hill. Cryptography in An Algebraic Alphabet , 1929 .
[12] T PandurangaH,et al. Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique , 2012 .
[13] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[14] Alexander G. Chefranov,et al. Hill Cipher Modification based on Pseudo-Random Eigenvalues , 2014 .
[15] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[16] Joseph H. Silverman,et al. Elliptic Curves and Cryptography , 2014 .
[17] H. T. Panduranga,et al. Hybrid approach for dual image encryption using nibble exchange and Hill-cipher , 2012, 2012 International Conference on Machine Vision and Image Processing (MVIP).
[18] Mohammed Amin,et al. How to repair the Hill cipher , 2006 .
[19] T PandurangaH,et al. Encryption Approach for Images using Bits Rotation Reversal and Extended Hill Cipher Techniques , 2012 .
[20] Turki F. Al-Somani,et al. Parallelizing GF(P) elliptic curve cryptography computations for security and speed , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.
[21] A. K. Gulve,et al. A Comparative Performance Analysis of an Image Encryption Technique using Extended Hill Cipher , 2014 .
[22] A. Gutub,et al. SERIAL VS. PARALLEL ELLIPTIC CURVE CRYPTO PROCESSOR DESIGNS , 2013 .
[23] Mohammad Ubaidullah Bokhari,et al. A Review on Symmetric Key Encryption Techniques in Cryptography , 2016 .
[24] Saroj Kumar Panigrahy,et al. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm , 2007 .
[25] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[26] Adnan Abdul-Aziz Gutub,et al. Power-time flexible architecture for GF(2k) elliptic curve cryptosystem computation , 2003, GLSVLSI '03.