Author:
Qobbi Younes,Abid Abdellah,Jarjar Mariem,El Kaddouhi Samir,Jarjar Abdellatif,Benazzi Abdelhamid
Publisher
Springer International Publishing
Reference10 articles.
1. Lecture Notes in Computer Science;T Habutsu,1991
2. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Hoboken (2007)
3. Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)
4. Patidar, V., Pareek, N.K., Purohit, G., Sud, K.K.: Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 15(10), 2755–2765 (2010)
5. Li, S., Chen, G., Zheng, X.: Chaos-based encryption for digital image and video. In: Multimedia Encryption and Authentication Techniques and Applications, pp. 129 (2006)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献