Author:
Kaur Mandeep,Singh Surender,Kaur Manjit,Singh Arjun,Singh Dilbag
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference57 articles.
1. Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243–250
2. NIST (2001) Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, 0311
3. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399. https://doi.org/10.1016/j.chaos.2005.08.110
4. Samhita P, Prasad P, Patro KAK, Acharya B (2016) A secure chaos-based image encryption and decryption using crossover and mutation operator. Int J Control Theory Appl 9(34):17–28
5. Gupta A, Thawait R, Patro KAK, Acharya B (2016) A novel image encryption based on bit-shuffled improved tent map. Int J Control Theory Appl 9(34):1–16
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献