X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
encryption (64) 64
computer science, information systems (36) 36
cryptography (35) 35
security (34) 34
algorithms (31) 31
cryptanalysis (31) 31
engineering, electrical & electronic (29) 29
image encryption (29) 29
computer science (28) 28
computer science, theory & methods (24) 24
algorithm (22) 22
verschlüsselung (21) 21
analysis (20) 20
chosen-plaintext attack (18) 18
optics (17) 17
chosen plaintext attack (16) 16
diffusion (16) 16
plaintext attack (16) 16
scheme (16) 16
telecommunications (16) 16
computer communication networks (15) 15
data encryption (15) 15
permutation (15) 15
engineering (14) 14
engineering, mechanical (14) 14
mechanics (14) 14
computer science, software engineering (13) 13
automotive engineering (12) 12
mechanical engineering (12) 12
vibration, dynamical systems, control (12) 12
chaos (11) 11
computer information security (11) 11
computer simulation (11) 11
chaos theory (10) 10
ciphers (10) 10
permutations (10) 10
data structures, cryptology and information theory (9) 9
mathematical analysis (9) 9
investment analysis (8) 8
multimedia information systems (8) 8
only multimedia ciphers (8) 8
special purpose and application-based systems (8) 8
system (8) 8
breaking (7) 7
optical encryption (7) 7
quantitative cryptanalysis (7) 7
chaotic communication (6) 6
coding and information theory (6) 6
communications engineering, networks (6) 6
cryptography and security (6) 6
cryptosystem (6) 6
entschlüsselung (6) 6
fresnel domain (6) 6
gyrator transform (6) 6
information (6) 6
logistic map (6) 6
mathematical models (6) 6
physics (6) 6
pixels (6) 6
privacy (6) 6
security analysis (6) 6
sicherheitsanalyse (6) 6
verschlüsselungsalgorithmus (6) 6
chaotic system (5) 5
cloud computing (5) 5
computer systems (5) 5
known-plaintext attack (5) 5
mathematics, applied (5) 5
multimedia (5) 5
resists (5) 5
authentication (4) 4
block cipher (4) 4
chaotisches system (4) 4
classical mechanics (4) 4
combinatorics (4) 4
complexity (4) 4
compression (4) 4
differential cryptanalysis (4) 4
dna (4) 4
domain (4) 4
electrical engineering (4) 4
key (4) 4
physics, multidisciplinary (4) 4
plaintext related (4) 4
public key infrastructure (4) 4
public-key encryption (4) 4
research article (4) 4
strategy (4) 4
transforms (4) 4
astrophysics (3) 3
asymmetry (3) 3
authenticated encryption (3) 3
chaotic image encryption (3) 3
chosen plaintext attacks (3) 3
combination (3) 3
computational complexity (3) 3
computational ghost imaging (3) 3
computer science, artificial intelligence (3) 3
computer-system (3) 3
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Nonlinear dynamics, ISSN 1573-269X, 2018, Volume 94, Issue 2, pp. 1319 - 1333
Journal Article
Entropy (Basel, Switzerland), ISSN 1099-4300, 2018, Volume 20, Issue 7, pp. 535 - 20
Journal Article
Entropy (Basel, Switzerland), ISSN 1099-4300, 2018, Volume 20, Issue 4, p. 282
.... This paper presents a symmetric color image encryption system based on plaintext-related random access bit-permutation mechanism (PRRABPM... 
Image encryption | Bit-level permutation | Plaintext related | PRRABPM | BREAKING | plaintext related | PHYSICS, MULTIDISCIPLINARY | ENHANCEMENTS | CRYPTANALYSIS | bit-level permutation | image encryption | COMBINATION | MAP | Permutations | Algorithms | Data encryption | Computer simulation | Images | Color | Random access | Encryption | Diffusion | Pixels
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 8540, pp. 350 - 369
Conference Proceeding
Journal of Modern Optics, ISSN 0950-0340, 03/2020, Volume 67, Issue 5, pp. 394 - 404
.... To address these problems, a plaintext-related ghost imaging encryption system which can reduce the key size and ensure the security of the system was proposed in this study... 
XOR operation | plaintext-related image encryption | Computational ghost imaging | logistic map | ALGORITHM | TRANSFORM | OPTICS | Parameters | Encryption | Masks | Imaging | Linearity | Images
Journal Article
Journal of optics (2010), ISSN 2040-8978, 06/2020, Volume 22, Issue 6, p. 65701
A hybrid cryptosystem based on plaintext-related ghost imaging and elliptic curve public-key cryptographic algorithm (ECC... 
computational ghost imaging | elliptic curve public-key cryptographic algorithm | SCHEME | OPTICAL ENCRYPTION | OPTICS | plaintext-related image cryptosystem | logistic map
Journal Article
Technical review - IETE, ISSN 0974-5971, 2015, Volume 33, Issue 3, pp. 310 - 322
This paper proposed a plaintext-related image encryption system, which employed the hyper-chaotic system to generate the secret code streams used for encryption... 
Image encryption | plaintext related shuffling | diffusion | chaotic system | Chaotic system | Diffusion | Plaintext related shuffling | SCHEME | AUTHENTICATION | ROBUST | DNA-SEQUENCE OPERATION | PERMUTATION | TELECOMMUNICATIONS | BLOCK CIPHER | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
COMPUTING AND INFORMATICS, ISSN 1335-9150, 2019, Volume 38, Issue 3, pp. 647 - 678
This paper describes a plaintext related image encryption algorithm that utilizes the Mojette transform for computation of bins that are subsequently combined with pixels of the processed image... 
Image encryption | SCHEME | Mojette transform | CRYPTANALYSIS | plaintext related operation | pixel intensity chaining | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | logistic map
Journal Article
Journal of cryptology, ISSN 1432-1378, 1994, Volume 7, Issue 4, pp. 229 - 246
Journal Article
Multimedia tools and applications, ISSN 1573-7721, 2019, Volume 79, Issue 3-4, pp. 2719 - 2743
Journal Article
IEEE access, ISSN 2169-3536, 2019, Volume 7, pp. 30344 - 30360
In order to improve the image encryption system's ability to resist plaintext, noise, and data loss attacks, in this paper, a new plaintext-related and chaos-based image encryption scheme is proposed... 
Performance evaluation | chaotic sequence | Image encryption | Sensitivity | Chaotic communication | Resists | Anti-noise and data loss attacks | Cathode ray tubes | Generators | plaintext-related | Encryption | residue number system | COMPUTER SCIENCE, INFORMATION SYSTEMS | SECURE | PERMUTATION | TELECOMMUNICATIONS | MAP | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Kybernetika, ISSN 0023-5954, 2008, Volume 44, Issue 4, pp. 501 - 510
Journal Article
IEEE access, ISSN 2169-3536, 2019, Volume 7, pp. 147106 - 147118
Journal Article
IEEE access, ISSN 2169-3536, 2019, Volume 7, pp. 181589 - 181609
.... Therefore, after analyzing many literatures related to chaotic image encryption, we propose a plain-image-related chaotic image encryption algorithm based on the deoxyribonucleic acid (DNA... 
Ciphers | Chaotic communication | Chaotic system | DNA | Streaming media | cryptanalysis | discrete logarithm | chosen-plaintext attack | Encryption | image encryption | DNA sequence operation | SYSTEM | COMPUTER SCIENCE, INFORMATION SYSTEMS | PERMUTATION | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | CRYPTOSYSTEM | SECURITY | MAP
Journal Article
by Lu, B and Liu, FL and Ge, X and Li, ZY
CMC-COMPUTERS MATERIALS & CONTINUA, ISSN 1546-2218, 2019, Volume 61, Issue 2, pp. 687 - 699
Journal Article
2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference, 05/2016, pp. 293 - 297
A new plaintext-related image cryptosystem based on chaotic system is presented, which includes a pair of plaintext-unrelated forward diffusion and backward diffusion, and one plaintext-related confusion... 
Ciphers | Histograms | Image encryption | Chaotic communication | plaintext-related encryption algorithm | image shuffling | Transforms | Streaming media | Encryption | chaotic system
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.