A survey about the latest trends and research issues of cryptographic elements
暂无分享,去创建一个
Mohsin Iftikhar | Ijaz Ali Shoukat | Kamalrulnizam Abu Bakar | K. A. Bakar | M. Iftikhar | I. Shoukat
[1] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[2] P. V. Oorschot. Overview of Cryptography , .
[3] Rishab Nithyanand. A Survey on the Evolution of Cryptographic Protocols in ePassports , 2009, IACR Cryptol. ePrint Arch..
[4] Tianjie Cao,et al. Research of Chaotic Block Cipher Algorithm Based on Logistic Map , 2009, 2009 Second International Conference on Intelligent Computation Technology and Automation.
[5] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[6] Tianjie Cao,et al. Survey: Image Encryption using Chaotic Cryptography Schemes , 2011 .
[7] Ratna Dutta,et al. Pairing-Based Cryptographic Protocols : A Survey , 2004, IACR Cryptol. ePrint Arch..
[8] Mayank Mishra,et al. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2006 .
[9] Vashitva Kumar Srivastava,et al. A Symmetric Key Cryptographic Algorithm , 2012 .
[10] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[11] W. Z. Gandhare,et al. Survey of Visual Cryptography Schemes , 2010 .
[12] Xin Zhang,et al. A new chaotic algorithm for image encryption , 2006 .
[13] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[14] Piya Techateerawat. A Review on Quantum Cryptography Technology , 2010 .
[15] Birgit Pfitzmann,et al. Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.
[16] R. Balasubramaniam,et al. BioCryptosystems for Authentication and Network Security-A Survey , 2010 .
[17] Masayuki Kanda,et al. Year 2010 Issues on Cryptographic Algorithms , 2007 .
[18] David A. Cooper,et al. Quantum resistant public key cryptography: a survey , 2009, IDtrust '09.
[19] Burton S. Kaliski. A survey of encryption standards , 1993, IEEE Micro.
[20] Marianne M. Swanson,et al. Standards for Security Categorization of Federal Information and Information Systems , 2004 .
[21] L. W. Hawkes,et al. An Application of Visual Cryptography To Financial Documents , 2000 .
[22] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .