Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure prngs
Image encryption is increasingly becoming an important area of research in information
security and network communications as digital images are widely used in various …
security and network communications as digital images are widely used in various …
Hyperchaotic maps and the single neuron model: A novel framework for chaos-based image encryption
With the explosion of the generation, transmission and sharing of image data over the
Internet and other unsecured networks, the need for and significance of the development of …
Internet and other unsecured networks, the need for and significance of the development of …
Application of dna coding, the lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem
The need for information security has become urgent due to the constantly changing nature
of the Internet and wireless communications, as well as the daily generation of enormous …
of the Internet and wireless communications, as well as the daily generation of enormous …
Multi-stage rgb image encryption
The demand for efficient picture encryption techniques is growing all the time. Meanwhile,
recent research has demonstrated that using chaotic functions and PRNG to administrate …
recent research has demonstrated that using chaotic functions and PRNG to administrate …
Efficient dynamic S-box generation using linear trigonometric transformation for security applications
Protection of data transmitted over the network from illegal access is one of the major
challenges being posed by exponential growth of data in online digital communication …
challenges being posed by exponential growth of data in online digital communication …
A new S-box generator algorithm based on 3D chaotic maps and whale optimization algorithm
F Artuğer - Wireless Personal Communications, 2023 - Springer
Encryption provides security in cases such as storing confidential information or transmitting
it over a network. Today, block cipher algorithms are generally used for encryption …
it over a network. Today, block cipher algorithms are generally used for encryption …
A cryptographic scheme for construction of substitution boxes using quantic fractional transformation
In the new era of cryptography, Substitution Boxes (S-Boxes) are very important to raise
confusion in cipher text and the security of encryption directly depends on the algebraic …
confusion in cipher text and the security of encryption directly depends on the algebraic …
[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
An effective method to improve nonlinearity value of substitution boxes based on random selection
In today's digital society, new design alternatives are needed for substitution box structures,
which has critical importance in develo** secure information systems that are resistant to …
which has critical importance in develo** secure information systems that are resistant to …
A novel S-box generator using Frobenius automorphism and its applications in image encryption
The goal of cryptography is to provide algorithms that safeguard sensitive information sent
via unprotected networks. These methods encrypt the information, making it unintelligible …
via unprotected networks. These methods encrypt the information, making it unintelligible …