Lightweight, dynamic and efficient image encryption scheme
暂无分享,去创建一个
Ali Chehab | Raphaël Couturier | Mohammad M. Mansour | Mohamad Noura | Hassan Noura | A. Chehab | H. Noura | R. Couturier | M. Noura
[1] Jason Smith,et al. SIMON and SPECK: Block Ciphers for the Internet of Things , 2015, IACR Cryptol. ePrint Arch..
[2] Kyoji Shibutani,et al. Piccolo: An Ultra-Lightweight Blockcipher , 2011, CHES.
[3] Ana Cristina Dascalescu,et al. A new hyperchaotic map and its application in an image encryption scheme , 2014, Signal Process. Image Commun..
[4] Zhiliang Zhu,et al. An efficient image encryption scheme using lookup table-based confusion and diffusion , 2015, Nonlinear Dynamics.
[5] Bhaskar Mondal,et al. A light weight secure image encryption scheme based on chaos & DNA computing , 2017, J. King Saud Univ. Comput. Inf. Sci..
[6] S. Kyoji,et al. Piccolo: An Ultra-Lightweight Blockcipher , 2011 .
[7] Safwan El Assad,et al. A new chaos-based image encryption system , 2016, Signal Process. Image Commun..
[8] Xiaojing Wang,et al. Image Encryption Based on Bivariate Polynomials , 2008, CSSE.
[9] Mohammad Eshghi,et al. Chaotic image encryption system using phase-magnitude transformation and pixel substitution , 2011, Telecommunication Systems.
[10] Andrea C. Arpaci-Dusseau,et al. Error propagation analysis for file systems , 2009, PLDI '09.
[11] Kwok-Tung Lo,et al. Breaking an Image Encryption Algorithm Based on Chaos , 2010, Int. J. Bifurc. Chaos.
[12] Ali Chehab,et al. A new efficient lightweight and secure image cipher scheme , 2017, Multimedia Tools and Applications.
[13] Amir Akhavan,et al. A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .
[14] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[15] Shay Gueron,et al. Intel's New AES Instructions for Enhanced Performance and Security , 2009, FSE.
[16] Thomas Peyrin,et al. The LED Block Cipher , 2011, IACR Cryptol. ePrint Arch..
[17] Xing-yuan Wang,et al. Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation , 2014 .
[18] A. A-A Gutub,et al. Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[19] Anne Canteaut,et al. PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) , 2012, IACR Cryptol. ePrint Arch..
[20] Wenling Wu,et al. LBlock: A Lightweight Block Cipher , 2011, ACNS.
[21] Reza Ebrahimi Atani,et al. A novel image encryption algorithm based on hash function , 2010, 2010 6th Iranian Conference on Machine Vision and Image Processing.
[22] Hassan N. Noura,et al. An image encryption scheme based on irregularly decimated chaotic maps , 2014, Signal Process. Image Commun..
[23] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .
[24] Wei Xiang,et al. Error resilience performance evaluation of H.264 I-frame and JPWL for wireless image transmission , 2010, 2010 4th International Conference on Signal Processing and Communication Systems.
[25] Hassan N. Noura,et al. An efficient and secure cipher scheme for images confidentiality preservation , 2016, Signal Process. Image Commun..
[26] Sattar Mirzakuchaki,et al. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..
[27] C. K. Huang,et al. Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system , 2013, Telecommun. Syst..
[28] Aniruddha Bhattacharjya,et al. Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known Attacks , 2013, SSCC.
[29] Wolfgang A. Halang,et al. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.
[30] Shujun Li,et al. Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[31] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[32] Yinglong Wang,et al. Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations , 2008, 2008 International Conference on Computational Intelligence and Security.
[33] Adnan Abdul-Aziz Gutub,et al. Counting-based secret sharing technique for multimedia applications , 2019, Multimedia Tools and Applications.
[34] Hassan N. Noura,et al. ERSS-RLNC: Efficient and robust secure scheme for random linear network coding , 2014, Comput. Networks.
[35] Zhu Wang,et al. A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator , 2009 .
[36] Wei Zhang,et al. A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..
[37] Kazuhiko Minematsu,et al. $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.
[38] Nasharuddin Zainal,et al. High Definition Image Encryption Algorithm Based on AES Modification , 2014, Wirel. Pers. Commun..
[39] Christophe De Vleeschouwer,et al. Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..
[40] Daesung Kwon,et al. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors , 2013, WISA.
[41] Anil Kumar,et al. Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map , 2010, ICISTM.
[42] Rengarajan Amirtharajan,et al. Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.
[43] Carmen R. Wilson VanVoorhis,et al. Understanding Power and Rules of Thumb for Determining Sample Sizes , 2007 .
[44] Safya Belghith,et al. Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .
[45] Jung Hwan Song,et al. On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher , 2006, ICISC.
[46] S. Li,et al. Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .
[47] Rafat Parveen,et al. Wavelet based partial image encryption , 2009, 2009 International Multimedia, Signal Processing and Communication Technologies.
[48] G. Hommel,et al. Confidence interval or p-value?: part 4 of a series on evaluation of scientific publications. , 2009, Deutsches Arzteblatt international.
[49] Manoj Kumar,et al. FeW: A Lightweight Block Cipher , 2019, IACR Cryptol. ePrint Arch..
[50] Khumanthem Manglem Singh,et al. A robust image encryption scheme based on chaotic system and elliptic curve over finite field , 2017, Multimedia Tools and Applications.
[51] Nicky Mouha,et al. Report on Lightweight Cryptography , 2017 .
[52] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[53] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[54] Sean O'Melia,et al. Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[55] Irina Filip,et al. Challenges and perspectives of child labor , 2018, Industrial psychiatry journal.
[56] Feng Huang,et al. Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm , 2009 .
[57] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.