Related references
Note: Only part of the references are listed.Hybrid encryption algorithm (HEA) based on chaotic system
Mimoun Hamdi et al.
SOFT COMPUTING (2021)
A public key encryption scheme based on a new variant of LWE with small cipher size
Ziqing Wang et al.
JOURNAL OF SYSTEMS ARCHITECTURE (2021)
被撤回的出版物: Hybrid optimization with cryptography encryption for medical image security in Internet of Things (Retracted article. See DEC, 2022)
Mohamed Elhoseny et al.
NEURAL COMPUTING & APPLICATIONS (2020)
Symmetric Key Encryption Based on Rotation-Translation Equation
Borislav Stoyanov et al.
SYMMETRY-BASEL (2020)
An efficient image encryption scheme based on chaotic and Deoxyribonucleic acid sequencing
Abdullah Alghafis et al.
MATHEMATICS AND COMPUTERS IN SIMULATION (2020)
Chaos based efficient selective image encryption
Jan Sher Khan et al.
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING (2019)
A novel chaotic image encryption technique based on multiple discrete dynamical maps
Majid Khan et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2019)
An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
Sameh S. Askar et al.
ENTROPY (2019)
The unified image encryption algorithm based on chaos and cubic S-Box
Yong Zhang
INFORMATION SCIENCES (2018)
A Chaotic Image Encryption Algorithm Based on Information Entropy
Guodong Ye et al.
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS (2018)
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys
Rahul Saha et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding
Naveed Ahmed Azam
SECURITY AND COMMUNICATION NETWORKS (2017)
Protecting Private Data by Honey Encryption
Wei Yin et al.
SECURITY AND COMMUNICATION NETWORKS (2017)
A Novel Encryption Algorithm Based on DWT and Multichaos Mapping
Wei Wang et al.
JOURNAL OF SENSORS (2016)
Security Algorithms for Cloud Computing
Akashdeep Bhardwaj et al.
INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016) (2016)
Security Enhancement of Text Message Based on Matrix Approach Using Elliptical Curve Cryptosystem
V. Kamalakannan et al.
2ND INTERNATIONAL CONFERENCE ON NANOMATERIALS AND TECHNOLOGIES (CNT 2014) (2015)
Implementation of Text Encryption using Elliptic Curve Cryptography
Laiphrakpam Dolendro Singh et al.
ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015 (2015)
On some generalized discrete logistic maps
Ahmed G. Radwan
JOURNAL OF ADVANCED RESEARCH (2013)