Author:
Deb Subhrajyoti,Bhuyan Bubu
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference45 articles.
1. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(08):2129–2151
2. Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn 87(1):337–361
3. Bishoi SK, Haran HK, Hasan SU (2017) A note on the multiple-recursive matrix method for generating pseudorandom vectors. Discrete Appl Math 222:67–75
4. Burnett L, Millan W, Dawson E, Clark A (2004) Simpler methods for generating better Boolean functions with good cryptographic properties. Australas J Comb 29:231–248
5. Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76(7):9907–9927
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献