A new algorithm for the construction of substitution box by using chaotic map
暂无分享,去创建一个
[1] Tariq Shah,et al. A scheme based on algebraic and chaotic structures for the construction of substitution box , 2019, Multimedia Tools and Applications.
[2] Tariq Shah,et al. Construction of new substitution boxes using linear fractional transformation and enhanced chaos , 2019, Chinese Journal of Physics.
[3] Yi-Ping Phoebe Chen,et al. Designing secure substitution boxes based on permutation of symmetric group , 2019, Neural Computing and Applications.
[4] Iqtadar Hussain,et al. Construction of S-Box Based on Chaotic Map and Algebraic Structures , 2019, Symmetry.
[5] Iqtadar Hussain,et al. A Novel Method to Identify Initial Values of Chaotic Maps in Cybersecurity , 2019, Symmetry.
[6] Iqtadar Hussain,et al. A novel algorithm for thermal image encryption. , 2018, Journal of integrative neuroscience.
[7] Arslan Shafique,et al. Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps , 2018, The European Physical Journal Plus.
[8] Aslam Muhammad,et al. A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map , 2018, Secur. Commun. Networks.
[9] Amir Anees,et al. A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps , 2018, The European Physical Journal Plus.
[10] Tariq Shah,et al. A novel construction of substitution box using a combination of chaotic maps with improved chaotic range , 2017, Nonlinear Dynamics.
[11] Dawei Wang,et al. A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .
[12] Kalyani Mali,et al. A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map , 2016 .
[13] Amir Anees,et al. An Image Encryption Scheme Based on Lorenz System for Low Profile Applications , 2015 .
[14] Yuling Luo,et al. A perturbation method to the tent map based on Lyapunov exponent and its application , 2015 .
[15] Zeeshan Ahmed,et al. A Technique for Designing Substitution Box Based on Van der Pol Oscillator , 2015, Wirel. Pers. Commun..
[16] Adil Masood Siddiqui,et al. Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..
[17] Mohammed Yakoob Siyal,et al. A Noisy Channel Tolerant Image Encryption Scheme , 2014, Wireless Personal Communications.
[18] M. I. Moussa,et al. Image encryption based on new one-dimensional chaotic map , 2014, 2014 International Conference on Engineering and Technology (ICET).
[19] Adil Masood Siddiqui,et al. A technique for digital watermarking in combined spatial and transform domains using chaotic maps , 2013, 2013 2nd National Conference on Information Assurance (NCIA).
[20] M. Gondal,et al. Analysis of optimized signal processing algorithms for smart antenna system , 2013, Neural Computing and Applications.
[21] Stefan Winkler,et al. Analysis of Public Image and Video Databases for Quality Assessment , 2012, IEEE Journal of Selected Topics in Signal Processing.
[22] Xingyuan Wang,et al. Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .
[23] Ibrahim Sogukpinar,et al. Analysis and Comparison of Image Encryption Algorithms , 2007 .
[24] Baodian Wei,et al. An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[25] A. Lloyd. THE COUPLED LOGISTIC MAP : A SIMPLE MODEL FOR THE EFFECTS OF SPATIAL HETEROGENEITY ON POPULATION DYNAMICS , 1995 .
[26] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[27] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[28] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[29] Iqtadar Hussain,et al. Image encryption based on Chebyshev chaotic map and S8 S-boxes , 2019 .
[30] Chuandong Li,et al. A DNA-based security solution using aggregated chaos cross and cubic map , 2016, Int. Arab J. Inf. Technol..
[31] Fawad Ahmed,et al. Hash-Based Authentication of Digital Images in Noisy Channels , 2015 .
[32] Iqtadar Hussain,et al. Application of Mean of Absolute Deviation Method for the Selection of Best Nonlinear Component Based on Video Encryption , 2013 .
[33] Yong Wang,et al. Analyses of SKIPJACK S-Box , 2011 .
[34] Tariq Shah,et al. Statistical analysis of S-box in image encryption applications based on majority logic criterion , 2011 .
[35] Eltayeb Salih Abuelyman,et al. An Optimized Implementation of the S-Box using Residues of Prime Numbers , 2008 .
[36] Ling-guo Cui,et al. A NEW S-BOX STRUCTURE NAMED AFFINE-POWER-AFFINE , 2007 .