[HTML][HTML] A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher
ZE Dawahdeh, SN Yaakob, RR bin Othman - Journal of King Saud …, 2018 - Elsevier
Image encryption is rapidly increased recently by the increasing use of the internet and
communication media. Sharing important images over unsecured channels is liable for …
communication media. Sharing important images over unsecured channels is liable for …
[HTML][HTML] Securing medical information transmission between IoT devices: An innovative hybrid encryption scheme based on quantum walk, DNA encoding, and chaos
The healthcare industry has undergone a transformation due to the widespread use of
advanced communication technologies and wireless sensor networks such as the Internet of …
advanced communication technologies and wireless sensor networks such as the Internet of …
[PDF][PDF] Dynamic key matrix of hill cipher using genetic algorithm
Genetic algorithms can solve complex problems, including the problems of cryptography.
What problems often occur on the Hill Cipher is the waste of time to determine the numbers …
What problems often occur on the Hill Cipher is the waste of time to determine the numbers …
[PDF][PDF] A new hybrid text encryption approach over mobile ad hoc network
Data exchange has been rapidly increased recently by increasing the use of mobile
networks. Sharing information (text, image, audio and video) over unsecured mobile network …
networks. Sharing information (text, image, audio and video) over unsecured mobile network …
An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography
M Benssalah, Y Rhaskali, K Drouiche - Multimedia Tools and Applications, 2021 - Springer
Nowadays, diagnosing patient diseases remotely is a routine and digital medical images
analysis as a part of Telecare Medical Information Systems (TMIS) play a fundamental role …
analysis as a part of Telecare Medical Information Systems (TMIS) play a fundamental role …
Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps
M Essaid, I Akharraz, A Saaidi - Journal of Information Security and …, 2019 - Elsevier
This article suggests a new image encryption algorithm based on a secure variant of Hill
Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …
Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …
A new secure transmission scheme between senders and receivers using HVCHC without any loss
S Almutairi, M Aborokbah - EURASIP Journal on Wireless …, 2019 - Springer
This paper presents a novel secure medical image transmission scheme using hybrid visual
cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale …
cryptography and Hill cipher (HVCHC) between sender and receiver. The gray scale …
Three-pass protocol concept in Hill Cipher encryption technique
APU Siahaan - Seminar Nasional Aplikasi Teknologi Informasi …, 2016 - journal.uii.ac.id
Encryption is imperative in the world of computers. Delivery of data requires a technique that
the data is free from attack. Hill Cipher is the popular cryptography method. There are so …
the data is free from attack. Hill Cipher is the popular cryptography method. There are so …
Hill cipher modification: A simplified approach
JR Paragas, AM Sison… - 2019 IEEE 11th …, 2019 - ieeexplore.ieee.org
Most people nowadays are using the internet as a means of communication to facilitate
exchanging sensitive data. Securing this data is vital considering almost all computers in the …
exchanging sensitive data. Securing this data is vital considering almost all computers in the …
A triple hill cipher algorithm proposed to increase the security of encrypted binary dataand its implementation using FPGA
AAM Khalaf, MS Abd El-karim… - 2016 18th International …, 2016 - ieeexplore.ieee.org
Encrypted binary data security is an important task in the field of data communication
systems since many decades. In this paper, we study the security problem and present a …
systems since many decades. In this paper, we study the security problem and present a …