Author:
Elrefaey Amany,Sarhan Amany,El-Shennawy Nada M.
Publisher
Springer Science and Business Media LLC
Reference31 articles.
1. Biham E, Shamir A.: Differential cryptanalysis of the data encryption standard. Springer Science & Business Media; (2012)
2. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
3. Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)
4. Ranjan R, Poonguzhali I.: VLSI implementation of IDEA encryption algorithm. Mobile Pervasive Comput. (CoMPC–2008). 97–101 (2008)
5. Kwok, H.S., Tang, W.K.: A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4), 1518–1529 (2007)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献