Author:
Sarmah Dipti Kapoor,Kulkarni Anand J.,Abraham Ajith
Publisher
Springer International Publishing
Reference90 articles.
1. Acharya, B., Shukla, S.K., Panigrahy, S.K., Patra, S.K., Panda, G.: H-S-X cryptosystem and its application to image encryption. In: International Conference on Advances in Computing, Control, and Telecommunication Technologies, 28–29 Dec 2009, IEEE, Trivandrum, Kerala, India (2009)
2. Ahmad, M., Khan, I.R., Alam, S.: Cryptanalysis of Image encryption algorithm based on fractional-order lorenz-like chaotic system. In: Satapathy, S.C. et al. (eds.) Emerging ICT for Bridging the Future, Advances in Intelligent Systems and Computing, Proceedings of the 49th Annual Convention of the Computer Society of India CSI, vol. 2, pp 381–388 (2015)
3. Akritas, A.G., Iyengar, S.S., Rampuria, A.A.: Computationally efficient algorithms for a one-time pad scheme. Int. J. Comput. Inform. Sci. 12(4), 285–316 (1983)
4. Aljohani, M., Ahmad, I., Basheri, M., Alassafi, M.O.: Performance analysis of cryptographic pseudorandom number generators special section on roadmap to 5G: rising to the challenge. IEEE Access 7, 39794–39805 (2019)
5. Arab, A., Rostami, M.J., Ghavami, B.: An image encryption method based on chaos system and AES algorithm. J. Supercomput. 75(10), 6663–6682 (2019)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献