Funder
Natural Science Foundation of Shandong Province
Reference28 articles.
1. A novel method to generate key-dependent s-boxes with identical algebraic properties[J];Al-Dweik;Journal of Information Security and Applications,2022
2. Al-Kareem, E. A., & Mohammed, R. S. (2021, April). A review of the most effective cryptography techniques based on conventional block cipher and lightweight. 2021 1st Babylon International Conference on Information Technology and Science (BICITS). IEEE, 257-262. https://doi.org/10.1109/BICITS51482.2021.9509903.
3. A method for generation of substitution box based on random selection[J];Artuğer;Egyptian Informatics Journal,2022
4. A substitution box generator, its analysis, and applications in image encryption[J];Azam;Signal Processing,2021
5. Barreto, P., & Rijmen, V. (2020, September). The Whirlpool hashing function. First open NESSIE Workshop, Leuven, Belgium.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献