Author:
Alexan Wassim,Elkhateeb Abdelrahman,Mamdouh Eyad,Al-Seba'Ey Fahd,Amr Ziad,Khalil Hana
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Dynamically Choosing S-Boxes Using SHA-256;2024 International Telecommunications Conference (ITC-Egypt);2024-07-22
2. Enhanced Image Encryption Using the Hénon Map, the LCG and the Lorenz System;2023 6th International Conference on Signal Processing and Information Security (ICSPIS);2023-11-08
3. The Application of the Linear Congruential Generator, the Single Neuron Model and Intel's MKL to Image Encryption;2023 2nd International Conference on Smart Cities 4.0;2023-10-22
4. Enhancing Image Security Using Legacy-Based Encryption With Chaotic Tent Map and Memristor;2023 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA);2023-09-20
5. Three Layered Image Encryption: An Application of Hyperchaos and Cellular Automata;2023 International Telecommunications Conference (ITC-Egypt);2023-07-18