FPGA implementation and design of a hybrid chaos-AES color image encryption algorithm

CH Yang, YS Chien - Symmetry, 2020 - mdpi.com
In this paper, we propose an image encryption algorithm based on four-dimensional chaotic
system to generate key and improve advanced encryption standard. The encryption …

A Smooth and Discontinuous Oscillator

Q Cao, A Léger, M Wiercigroch - Springer Tracts in Mechanical …, 2016 - Springer
The most interesting phenomenon in nonlinear dynamics and certainly one of the most
important changes in the understanding of the world in the last five or six decades, is the …

Analyses of S-boxes based on interval valued intuitionistic fuzzy sets and image encryption

S Abdullah, S Ayub, I Hussain, B Bedregal… - International Journal of …, 2017 - Springer
Decision making implies selection of the best decision from a set of possible options. In
some cases, this selection is based on past experience. Past experience is used to analyse …

[PDF][PDF] Securing Engineering Blueprints Transmission Using S-box and Chaos Theory

ZMS Gohar - 2023 - researchgate.net
This research paper explores the use of S-box and chaos theory in securing the
transmission of sensitive engineering blueprints. The study aims to demonstrate the …

[PDF][PDF] Image Encryption System Based on Cellular Automata and S-Box.

J Contreras, M Ramírez, J Aboytes - Res. Comput. Sci., 2019 - researchgate.net
This investigation presents an image encryption system and its security analysis, it is based
on cellular automata and a substitution box. The joint of these two techniques, allow to …

[PDF][PDF] Data hiding by lsb substitution using gene expression programming

MH Mohamed, IH Abul-Kasim - Int. J. Comput. Appl, 2012 - Citeseer
Steganography is defined as the art and science of writing hidden in such a way that no one
apart from the sender and the intended recipient even knows that there is a hidden …

Enhancement A5/1 stream cipher algorithm as lightweight generator

NH Jawad, LF Katran, S Albermany… - AIP Conference …, 2024 - pubs.aip.org
One of the oldest well-known algorithms that works on encrypting wireless communications
and that does not depend on large resources is the A5/1 algorithm and it is considered one …

Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices

P Asghari, SHHS Javadi - arXiv preprint arXiv:2102.13340, 2021 - arxiv.org
Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in
making these systems secure. Substitution Box (S-Box) has an effective impact in block …

Особливості розподілів імовірностей диференціалів S-блоків спеціального виду

І Маринін, П Ігорович - 2023 - ela.kpi.ua
Анотація Дана робота мiстить аналiз та застосування методiв вiдтворення
алгебраїчної структури S-блоку, яка є невiдомою. У роботi викладенi деякi алгоритми та …

[PDF][PDF] Защита на данни при съхранение, управление и пренос между мобилни устройства

ПП Събев - fmi.uni-sofia.bg
В съвременния свят мобилните устройства и технологии придобиват все по-голяма
значимост и заемат все по-важно място в ежедневието на хората. По данни от …