Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps

M Essaid, I Akharraz, A Saaidi - Journal of Information Security and …, 2019 - Elsevier
This article suggests a new image encryption algorithm based on a secure variant of Hill
Cipher (HC) and three improved one-dimensional (1D) chaotic maps. The proposed scheme …

A new cryptosystem of color image using a dynamic-chaos hill cipher algorithm

S Hraoui, F Gmira, MF Abbou, AJ Oulidi… - Procedia computer …, 2019 - Elsevier
The conventional symmetric Hill cipher encryption algorithm, applied for data encryption,
presents several disadvantages. However, a drawback of the conventional algorithm is …

Vigenere and genetic cross-over acting at the restricted ASCII code level for color image encryption

A JarJar - Medical & Biological Engineering & Computing, 2022 - Springer
In the current high-tech era, the growing popularity of e-healthcare has heightened the
attention focused on data security against cyber-attacks. As digital medical images are …

A secure variant of the Hill cipher

M Toorani, A Falahati - 2009 IEEE Symposium on Computers …, 2009 - ieeexplore.ieee.org
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-
plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in …

A modified hill cipher based on circulant matrices

KA Reddy, B Vishnuvardhan, AVN Krishna - Procedia Technology, 2012 - Elsevier
Secured communication of text information is prime importance across the globe.
Cryptography is one of the methods to attain security. The Hill cipher is a symmetric …

[PDF][PDF] Optimal ordering of analog integrated circuit tests to minimize test time

SD Huss, RS Gyurcsik - Proceedings of the 28th ACM/IEEE Design …, 1991 - dl.acm.org
This paper describes an algorithm that uses dynamic programming to order IC tests so that
faulty circuits are detected early in the test sequence and the average test time is minimized …

[PDF][PDF] Hill cipher modification based on pseudo-random eigenvalues

A Mahmoud, A Chefranov - Applied Mathematics & …, 2014 - naturalspublishing.com
The Hill cipher is resistant to brute-force and statistical attacks, but it can be broken with a
known plaintext-ciphertext attack (KPCA). In this paper, we propose a modification of the Hill …

[PDF][PDF] Improvement of hill's classical method in image cryptography

A Jarjar - International Journal of Statistics and Applied …, 2017 - mathsjournal.com
In this paper, we will introduce a new color image encryption algorithm. These images are of
arbitrary sizes (n, m). This technique is based on a coupling of two chaotic maps; Namely …

Hill cipher modification based on eigenvalues hcm-EE

AY Mahmoud, AG Chefranov - … of the 2nd international conference on …, 2009 - dl.acm.org
We propose and analyze a new modification of the Hill cipher, HCM-EE, generating dynamic
encryption key matrix by exponentiation that is made efficiently with the help of eigenvalues …

A secure cryptosystem based on affine transformation

M Toorani, A Falahati - Security and Communication Networks, 2011 - Wiley Online Library
In this paper, it is proved that Lin et al.'s scheme that tried to strengthen the Hill cipher
against the known‐plaintext attack has several security flaws and is vulnerable to the …