Author:
Annaby Mahmoud H.,Ayad Hassan,Rushdi Muhammad A.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference32 articles.
1. Amigó J, Kocarev L, Szczepanski J (2007) Theory and practice of chaotic cryptography. Phys Lett A 366(3):211–216
2. Annaby M, Rushdi M, Nehary E (2016) Image encryption via discrete fractional Fourier-type transforms generated by random matrices. Signal Process: Image Commun 49:25–46
3. Benjamini I, Schramm O, Wilson DB (2005) Balanced boolean functions that can be evaluated so that every input bit is unlikely to be read. In: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing. ACM, pp 244–250
4. Candan C, Kutay M, Ozaktas H (2000) The discrete fractional Fourier transform. IEEE Trans Signal Process 48(5):1329–1337
5. De Vos A (2011) Reversible computing: fundamentals, quantum computing, and applications. Wiley, Weinheim
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献