Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference59 articles.
1. Akraam M, Rashid T, Zafar S (2022) An image encryption scheme proposed by modifying chaotic tent map using fuzzy numbers [J]. Multimed Tools Appl 10(24):1–19
2. Algredo B (2013) FPGA-based implementation alternatives for the inner loop of the secure hash algorithm SHA-256. Microprocess Microsyst 37(9):750–757
3. Ametepe A, Ahouandjinou A, Ezin E (2022) Robust encryption method based on AES-CBC using elliptic curves Diffie-Hellman to secure data in wireless sensor networks. Wireless Netw 28(3):991–1001
4. Anand B (2020) Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform. Opt Lasers Eng 133(10):1–13
5. Ayubi P (2020) Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application. J Inf Sec Appl 52(6):1–20