Publisher
Springer International Publishing
Reference13 articles.
1. Panwar, K., Purwar, R.K., Srivastava, G.: A fast encryption scheme suitable for video surveillance applications using SHA-256 hash function and 1D sine-sine chaotic map. Int. J. Image Graph. 21(02), 50–54 (2021)
2. Abbasi, A.A., Mazinani, M., Hosseini, R.: Evolutionary-based image encryption using biomolecules operators and non-coupled map lattice. Optik – Int. J. Light Electron Opt. 219(12), 164949 (2020)
3. Sbaytri, Y., Lazaar, S.: A design of a new hash function based on cellular automata. J. Theor. Appl. Inf. Technol. 99(10), 2280–2289 (2021)
4. Abed, S., Waleed, L., Aldamkhi, G., et al.: Enhancement in data security and integrity using minhash technique. Indones. J. Electr. Eng. Comput. Sci. 21(3), 1739–1750 (2021)
5. Fitriyanto, R., Yudhana, A., Sunardi, S.: Implementation SHA512 hash function and Boyer-Moore string matching algorithm for Jpeg/exif message digest compilation. Jurnal Online Informatika 4(1), 16 (2019)