Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Region of interest-based medical image encryption technique based on chaotic S-boxes
Block cipher has been one of the most reliable options by which data security is achieved.
The strength of block cipher against various attacks is purely dependent on its confusion …
The strength of block cipher against various attacks is purely dependent on its confusion …
Designing S-box using tent-sine chaotic system while combining the traits of tent and sine map
Secure exchange of sensitive information between different entities is a serious challenge in
today's environment. Therefore, various cryptosystems have been created specifically for …
today's environment. Therefore, various cryptosystems have been created specifically for …
Construction of multivalued cryptographic boolean function using recurrent neural network and its application in image encryption scheme
The construction and development of new techniques for a nonlinear multivalued Boolean
function is one of the important aspects of modern ciphers. These multivalued Boolean …
function is one of the important aspects of modern ciphers. These multivalued Boolean …
A novel 4D hyperchaotic system assisted josephus permutation for secure substitution-box generation
Hyperchaotic systems found to exhibit better dynamics and behaviors compared to chaotic
systems due to great possibility of simultaneous exponential expansion of their system's …
systems due to great possibility of simultaneous exponential expansion of their system's …
Construction and optimization of dynamic s-boxes based on gaussian distribution
Block ciphers are widely used for securing data and are known for their resistance to various
types of attacks. The strength of a block cipher against these attacks often depends on the S …
types of attacks. The strength of a block cipher against these attacks often depends on the S …
Design of highly nonlinear confusion component based on entangled points of quantum spin states
Cryptosystems are commonly deployed to secure data transmission over an insecure line of
communication. To provide confusion in the data over insecure networks, substitution boxes …
communication. To provide confusion in the data over insecure networks, substitution boxes …
Block cipher's substitution box generation based on natural randomness in underwater acoustics and knight's tour chain
The protection of confidential information is a global issue, and block encryption algorithms
are the most reliable option for securing data. The famous information theorist, Claude …
are the most reliable option for securing data. The famous information theorist, Claude …
[PDF][PDF] Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare
Novel substitution-box generation using group theory for secure medical image encryption in
E-healthcare Page 1 AIMS Mathematics, 9(3): 6207–6237. DOI: 10.3934/math.2024303 …
E-healthcare Page 1 AIMS Mathematics, 9(3): 6207–6237. DOI: 10.3934/math.2024303 …
Constructing Highly Nonlinear Cryptographic Balanced Boolean Functions on Learning Capabilities of Recurrent Neural Networks
This study presents a novel approach to cryptographic algorithm design that harnesses the
power of recurrent neural networks. Unlike traditional mathematical-based methods, neural …
power of recurrent neural networks. Unlike traditional mathematical-based methods, neural …
Current-state opacity verification in discrete event systems using an observer net
Due to the proliferation of contemporary computer-integrated systems and communication
networks, there is more concern than ever regarding privacy, given the potential for sensitive …
networks, there is more concern than ever regarding privacy, given the potential for sensitive …