Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption
暂无分享,去创建一个
[1] M. N. Vrahatis,et al. Utilizing Evolutionary Computation Methods for the Design of S-Boxes , 2006, 2006 International Conference on Computational Intelligence and Security.
[2] Hongjun Liu,et al. A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise , 2015 .
[3] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[4] Liu Yang,et al. A new pseudorandom number generator based on a complex number chaotic equation , 2012 .
[5] Ali Kanso,et al. Keyed hash function based on a chaotic map , 2012, Inf. Sci..
[6] Musheer Ahmad,et al. Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption , 2013, J. Inf. Process. Syst..
[7] Musheer Ahmad,et al. A Chaos Based Method for Efficient Cryptographic S-box Design , 2013, SSCC.
[8] X. Liao,et al. A block cipher with dynamic S-boxes based on tent map , 2009 .
[9] Majid Khan,et al. An efficient method for the construction of block cipher with multi-chaotic systems , 2013 .
[10] Iqtadar Hussain,et al. A Scheme for Obtaining Secure S-Boxes Based on Chaotic Baker’s Map , 2014 .
[11] Sirma Yavuz,et al. Designing chaotic S-boxes based on time-delay chaotic system , 2013 .
[12] Musheer Ahmad,et al. Designing chaos based strong substitution box , 2015, 2015 Eighth International Conference on Contemporary Computing (IC3).
[13] Jian Wang,et al. Designing key-dependent chaotic S-box with larger key space , 2009 .
[14] Musheer Ahmad,et al. A new chaotic substitution box design for block ciphers , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).
[15] Musheer Ahmad,et al. A Novel Ant Colony Optimization Based Scheme for Substitution Box Design , 2015 .
[16] Guo Chen,et al. A novel heuristic method for obtaining S-boxes , 2008 .
[17] Xiaofeng Liao,et al. A novel method for designing S-boxes based on chaotic maps , 2005 .
[18] Varun Jeoti,et al. Efficient and Simple Method for Designing Chaotic S‐Boxes , 2008 .
[19] Stafford E. Tavares,et al. An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-Like Attacks , 1991, EUROCRYPT.
[20] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[21] Susan Stepney,et al. The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[22] Nilanjan Dey,et al. Highly Secured Multilayered Motion Vector Watermarking , 2014, AMLTA.
[23] Yahui Yu,et al. The Exponential Diophantine Equation 2x + b y = c z , 2014, TheScientificWorldJournal.
[24] V. Jeoti,et al. Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback , 2007, 2007 International Conference on Intelligent and Advanced Systems.
[25] Nilanjan Dey,et al. Rough Set Based Ad Hoc Network: A Review , 2014, Int. J. Serv. Sci. Manag. Eng. Technol..
[26] X. Liao,et al. An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .
[27] Zhijian Wang,et al. An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm , 2014, TheScientificWorldJournal.
[28] Nilanjan Dey,et al. Image Segmentation Using Rough Set Theory: A Review , 2014, Int. J. Rough Sets Data Anal..
[29] Vishal Bhatnagar,et al. Olympics Big Data Prognostications , 2016, Int. J. Rough Sets Data Anal..
[30] Zhongmeng Zhao,et al. An efficient chaotic image encryption based on alternate circular S-boxes , 2014, Nonlinear Dynamics.
[31] Yang Li,et al. A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .
[32] Nilanjan Dey,et al. Unmanned aerial system for post disaster identification , 2014, International Conference on Circuits, Communication, Control and Computing.
[33] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[34] S. Li,et al. Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.
[35] Ahmet Bedri Ozer,et al. A method for designing strong S-Boxes based on chaotic Lorenz system , 2010 .
[36] Tariq Shah,et al. An efficient construction of substitution box with fractional chaotic system , 2015, Signal Image Video Process..
[37] Musheer Ahmad,et al. A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique , 2014, SNDS.
[38] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[39] Safya Belghith,et al. Improvement of an image encryption algorithm based on hyper-chaos , 2011, Telecommunication Systems.
[40] Guanrong Chen,et al. On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.
[41] Hongjun Liu,et al. Chaos-based color image block encryption scheme using S-box , 2014 .
[42] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[43] Vipin Kumar,et al. Key Dependent Image Steganography Using Edge Detection , 2014, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.
[44] Tariq Shah,et al. Application of S-box and chaotic map for image encryption , 2013, Math. Comput. Model..
[45] Nilanjan Dey,et al. Image mining framework and techniques: a review , 2015 .