FPGA implementation and design of a hybrid chaos-AES color image encryption algorithm
CH Yang, YS Chien - Symmetry, 2020 - mdpi.com
In this paper, we propose an image encryption algorithm based on four-dimensional chaotic
system to generate key and improve advanced encryption standard. The encryption …
system to generate key and improve advanced encryption standard. The encryption …
A Smooth and Discontinuous Oscillator
Q Cao, A Léger, M Wiercigroch - Springer Tracts in Mechanical …, 2016 - Springer
The most interesting phenomenon in nonlinear dynamics and certainly one of the most
important changes in the understanding of the world in the last five or six decades, is the …
important changes in the understanding of the world in the last five or six decades, is the …
Analyses of S-boxes based on interval valued intuitionistic fuzzy sets and image encryption
Decision making implies selection of the best decision from a set of possible options. In
some cases, this selection is based on past experience. Past experience is used to analyse …
some cases, this selection is based on past experience. Past experience is used to analyse …
[PDF][PDF] Securing Engineering Blueprints Transmission Using S-box and Chaos Theory
ZMS Gohar - 2023 - researchgate.net
This research paper explores the use of S-box and chaos theory in securing the
transmission of sensitive engineering blueprints. The study aims to demonstrate the …
transmission of sensitive engineering blueprints. The study aims to demonstrate the …
[PDF][PDF] Image Encryption System Based on Cellular Automata and S-Box.
This investigation presents an image encryption system and its security analysis, it is based
on cellular automata and a substitution box. The joint of these two techniques, allow to …
on cellular automata and a substitution box. The joint of these two techniques, allow to …
[PDF][PDF] Data hiding by lsb substitution using gene expression programming
MH Mohamed, IH Abul-Kasim - Int. J. Comput. Appl, 2012 - Citeseer
Steganography is defined as the art and science of writing hidden in such a way that no one
apart from the sender and the intended recipient even knows that there is a hidden …
apart from the sender and the intended recipient even knows that there is a hidden …
Enhancement A5/1 stream cipher algorithm as lightweight generator
NH Jawad, LF Katran, S Albermany… - AIP Conference …, 2024 - pubs.aip.org
One of the oldest well-known algorithms that works on encrypting wireless communications
and that does not depend on large resources is the A5/1 algorithm and it is considered one …
and that does not depend on large resources is the A5/1 algorithm and it is considered one …
Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices
P Asghari, SHHS Javadi - arXiv preprint arXiv:2102.13340, 2021 - arxiv.org
Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in
making these systems secure. Substitution Box (S-Box) has an effective impact in block …
making these systems secure. Substitution Box (S-Box) has an effective impact in block …
Особливості розподілів імовірностей диференціалів S-блоків спеціального виду
І Маринін, П Ігорович - 2023 - ela.kpi.ua
Анотація Дана робота мiстить аналiз та застосування методiв вiдтворення
алгебраїчної структури S-блоку, яка є невiдомою. У роботi викладенi деякi алгоритми та …
алгебраїчної структури S-блоку, яка є невiдомою. У роботi викладенi деякi алгоритми та …
[PDF][PDF] Защита на данни при съхранение, управление и пренос между мобилни устройства
ПП Събев - fmi.uni-sofia.bg
В съвременния свят мобилните устройства и технологии придобиват все по-голяма
значимост и заемат все по-важно място в ежедневието на хората. По данни от …
значимост и заемат все по-важно място в ежедневието на хората. По данни от …