Author:
Sahnoune Ahmed,Zeraoulia Elhadj
Publisher
Springer Science and Business Media LLC
Reference20 articles.
1. Standard DE et al (1999) Data encryption standard. Federal Information Processing Standards Publication, vol 112
2. Rijmen V, Daemen J (2001) Advanced encryption standard. In: Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology, pp 19–22
3. Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 2(21):120–126
4. Li H, Deng L, Gu Z (2020) A robust image encryption algorithm based on a 32-bit chaotic system. IEEE Access 8:30127–30151
5. Zia U, McCartney M, Scotney B, Martinez J, AbuTair M, Memon J, Sajjad A (2022) Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. Int J Inf Secur 21(4):917–935