Author:
Gupta Manish,Gupta Kamlesh Kumar,Shukla Piyush Kumar
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference39 articles.
1. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electron Commun 66(10):806–816
2. Anderson R, Biham E, Knudsen L (1998) Serpent: a proposal for the advanced encryption standard. In: Proceedings of the First Advanced Encryption Standard (AES) Conference, Ventura, CA, USA, 20–22
3. Asassfeh MR, Qatawneh M, Alazzeh F (2018) Performance Evaluation of Blowfish Algorithm on Supercomputer IMAN1. Int J Comp Netw Commun 10(2):43–53
4. Barker E, Roginsky A (2011) Transitions: recommendation for transitioning the use of cryptographic algorithms and key lengths. NIST Special Publication 800-131A
5. Bhowmik S, Acharyya S (2011) Application of GA in key generation for image transposition cipher algorithm. Venugopal K.R., Patnaik L.M. (eds) Computer networks and intelligent computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献