-
1دورية أكاديمية
المؤلفون: Xingyuan Wang, Yining Su
المصدر: IEEE Access, Vol 8, Pp 9260-9270 (2020)
مصطلحات موضوعية: Audio encryption, chaotic system, confusion and diffusion, DNA coding, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
2دورية أكاديمية
المؤلفون: Guidong Zhang, Weikang Ding, Lian Li
المصدر: Symmetry; Volume 12; Issue 3; Pages: 355
مصطلحات موضوعية: chaotic map, image encryption, simultaneous confusion and diffusion
وصف الملف: application/pdf
العلاقة: Computer Science and Symmetry/Asymmetry; https://dx.doi.org/10.3390/sym12030355Test
-
3
المؤلفون: P. Karthik, P. Shanthi Bala
المصدر: Journal of King Saud University - Computer and Information Sciences. 34:1933-1949
مصطلحات موضوعية: Polynomial, Theoretical computer science, General Computer Science, Computer science, business.industry, Hash function, Cryptography, Function (mathematics), Random oracle, MD5, Confusion and diffusion, Hardware_ARITHMETICANDLOGICSTRUCTURES, business, Bitwise operation
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::43f5720132c74174c493cf98aed41409Test
https://doi.org/10.1016/j.jksuci.2019.10.003Test -
4
المؤلفون: Fırat Artuğer, Fatih Özkaynak
المصدر: Egyptian Informatics Journal, Vol 23, Iss 1, Pp 127-135 (2022)
مصطلحات موضوعية: Computer science, Random number generation, business.industry, Cryptography, QA75.5-76.95, Management Science and Operations Research, Encryption, Image encryption, Computer Science Applications, Image (mathematics), Computer engineering, Electronic computers. Computer science, Component (UML), Confusion and diffusion, Focus (optics), business, Block cipher, S-box, Nonlinearity, Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d97bbc1bbe7b171a4cbcfa293d0c9865Test
https://doi.org/10.1016/j.eij.2021.08.002Test -
5
المؤلفون: R. Vidhya, M. Brindha
المصدر: Multimedia Tools and Applications. 81:3735-3772
مصطلحات موضوعية: Differential cryptanalysis, Computer Networks and Communications, business.industry, Computer science, Key space, Encryption, Scrambling, Image (mathematics), Permutation, Hardware and Architecture, Media Technology, Confusion and diffusion, business, Bitwise operation, Algorithm, Software
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::3c619065358a33128e8529a0b2678253Test
https://doi.org/10.1007/s11042-021-11720-3Test -
6
المؤلفون: Mohamed Gafsi, Jihene Malek, Mohamed Ali Hajjaji, Abdellatif Mtibaa
المصدر: Journal of Ambient Intelligence and Humanized Computing. 14:7001-7022
مصطلحات موضوعية: Hardware architecture, General Computer Science, business.industry, Computer science, Encryption, CHAOS (operating system), Cryptosystem, Hardware acceleration, Confusion and diffusion, Hardware_ARITHMETICANDLOGICSTRUCTURES, business, Field-programmable gate array, Throughput (business), Computer hardware
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::55736d74dfdffbb305ebdba5cbf2b1b0Test
https://doi.org/10.1007/s12652-021-03555-5Test -
7
المؤلفون: Massimo Alioto, Sachin Taneja
المصدر: IEEE Journal of Solid-State Circuits. 56:3049-3061
مصطلحات موضوعية: Key generation, Computer engineering, business.industry, Clock signal, Computer science, Random number generation, Datapath, Cryptography, Confusion and diffusion, Electrical and Electronic Engineering, Encryption, business, Randomness
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::d67efd80806cc30d2a59683910e51ef5Test
https://doi.org/10.1109/jssc.2021.3090247Test -
8
المؤلفون: Rakib Hassan, Machbah Uddin, Farah Jahan, Mohammad Khairul Islam
المصدر: Complex & Intelligent Systems. 7:3241-3258
مصطلحات موضوعية: Keyspace, business.industry, Computer science, ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, Cryptography, General Medicine, computer.software_genre, Encryption, Scrambling, Cipher, Histogram, Key (cryptography), Confusion and diffusion, Data mining, business, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::7c8094e370f54d1872570d46118f70abTest
https://doi.org/10.1007/s40747-021-00515-6Test -
9
المؤلفون: Chiranjeev Bhaya, Arup Kumar Pal, Abhay Kumar Singh, Pooja Mishra
المصدر: Journal of Ambient Intelligence and Humanized Computing. 14:1731-1752
مصطلحات موضوعية: General Computer Science, Pixel, Computer science, business.industry, ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, Encryption, Image (mathematics), Cipher, Key (cryptography), Cryptosystem, Confusion and diffusion, business, Algorithm, Decoding methods
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::e59bc54f043e280a5080f0c63b87989dTest
https://doi.org/10.1007/s12652-021-03410-7Test -
10
المؤلفون: Achyut Shankar, Sandeep Kautish, Mohammad Reza Khosravi, Manish Gupta, Piyush Kumar Shukla, Kamlesh Gupta
المصدر: Wireless Personal Communications. 121:1857-1878
مصطلحات موضوعية: Theoretical computer science, business.industry, Computer science, Crossover, Cryptography, Tent map, Encryption, Computer Science Applications, Genetic algorithm, Key (cryptography), Session key, Confusion and diffusion, Electrical and Electronic Engineering, business
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::e6da7a9887a191dfc132d3aa6c2de8c0Test
https://doi.org/10.1007/s11277-021-08742-3Test