Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "An encryption algorithm."
@article{DBLP:journals/connection/Guvenoglu24, author = {Erdal G{\"{u}}venoglu}, title = {An image encryption algorithm based on multi-layered chaotic maps and its security analysis}, journal = {Connect. Sci.}, volume = {36}, number = {1}, year = {2024}, url = {https://doi.org/10.1080/09540091.2024.2312108}, doi = {10.1080/09540091.2024.2312108}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/connection/Guvenoglu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/ZhangH24, author = {Hangming Zhang and Hanping Hu}, title = {An image encryption algorithm based on a compound-coupled chaotic system}, journal = {Digit. Signal Process.}, volume = {146}, pages = {104367}, year = {2024}, url = {https://doi.org/10.1016/j.dsp.2023.104367}, doi = {10.1016/J.DSP.2023.104367}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/ZhangH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/AnLXZL24, author = {Xinlei An and Siyang Liu and Li Xiong and Jiangang Zhang and Xinying Li}, title = {Mixed gray-color images encryption algorithm based on a memristor chaotic system and 2D compression sensing}, journal = {Expert Syst. Appl.}, volume = {243}, pages = {122899}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.122899}, doi = {10.1016/J.ESWA.2023.122899}, timestamp = {Sun, 26 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/AnLXZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/WenL24, author = {Heping Wen and Yiting Lin}, title = {Cryptanalysis of an image encryption algorithm using quantum chaotic map and {DNA} coding}, journal = {Expert Syst. Appl.}, volume = {237}, number = {Part {B}}, pages = {121514}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.121514}, doi = {10.1016/J.ESWA.2023.121514}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/WenL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/LiSL24, author = {Chengqing Li and Xianhui Shen and Sheng Liu}, title = {Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex Logistic Map}, journal = {{IEEE} Multim.}, volume = {31}, number = {1}, pages = {99--109}, year = {2024}, url = {https://doi.org/10.1109/MMUL.2024.3356494}, doi = {10.1109/MMUL.2024.3356494}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeemm/LiSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/RiazDNMAKBA24, author = {Mamoon Riaz and Hammad Dilpazir and Sundus Naseer and Hasan Mahmood and Asim Anwar and Junaid Khan and Ian B. Benitez and Tanveer Ahmad}, title = {Secure and Fast Image Encryption Algorithm Based on Modified Logistic Map}, journal = {Inf.}, volume = {15}, number = {3}, pages = {172}, year = {2024}, url = {https://doi.org/10.3390/info15030172}, doi = {10.3390/INFO15030172}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/RiazDNMAKBA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/DennunzioFM24, author = {Alberto Dennunzio and Enrico Formenti and Luciano Margara}, title = {An efficient algorithm deciding chaos for linear cellular automata over (Z/mZ)n with applications to data encryption}, journal = {Inf. Sci.}, volume = {657}, pages = {119942}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2023.119942}, doi = {10.1016/J.INS.2023.119942}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/DennunzioFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChenLTW24, author = {Rong Chen and Xiaomeng Li and Lin Teng and Xingyuan Wang}, title = {An image encryption algorithm based on the {LSCMM} chaotic map and bidirectional dynamic diffusion}, journal = {Multim. Tools Appl.}, volume = {83}, number = {2}, pages = {3681--3706}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-15810-2}, doi = {10.1007/S11042-023-15810-2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChenLTW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuZZB24, author = {Yingjie Hu and Qiuyu Zhang and Qiwen Zhang and Yujiao Ba}, title = {An intelligent homomorphic audio signal encryption algorithm for secure interacting}, journal = {Multim. Tools Appl.}, volume = {83}, number = {9}, pages = {25675--25693}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-16493-5}, doi = {10.1007/S11042-023-16493-5}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/HuZZB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiC24, author = {Qingfeng Li and Lei Chen}, title = {An image encryption algorithm based on 6-dimensional hyper chaotic system and {DNA} encoding}, journal = {Multim. Tools Appl.}, volume = {83}, number = {2}, pages = {5351--5368}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-15550-3}, doi = {10.1007/S11042-023-15550-3}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/LiC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/NaeemJKE24, author = {Ensherah A. Naeem and Anand B. Joshi and Dhanesh Kumar and Fathi E. Abd El{-}Samie}, title = {Few-detail image encryption algorithm based on diffusion and confusion using Henon and Baker chaotic maps}, journal = {Soft Comput.}, volume = {28}, number = {4}, pages = {2851--2861}, year = {2024}, url = {https://doi.org/10.1007/s00500-023-09333-z}, doi = {10.1007/S00500-023-09333-Z}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/NaeemJKE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/WangTW24, author = {Yafei Wang and Lin Teng and Xingyuan Wang}, title = {An image encryption algorithm based on circular rotation and generalized Feistel structure}, journal = {Soft Comput.}, volume = {28}, number = {5}, pages = {4335--4358}, year = {2024}, url = {https://doi.org/10.1007/s00500-023-08747-z}, doi = {10.1007/S00500-023-08747-Z}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/WangTW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HeCSW23, author = {Chenchen He and Zhong Chen and Xiyu Sun and Lujie Wang}, title = {An Algorithm Based on Hodgkin-Huxley Model and Latin Square for Image Encryption}, journal = {{IEEE} Access}, volume = {11}, pages = {34163--34174}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3250758}, doi = {10.1109/ACCESS.2023.3250758}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HeCSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cam/HussainAA23, author = {Iqtadar Hussain and Amir Anees and Temadher Alassiry Al{-}Maadeed}, title = {A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group}, journal = {Comput. Appl. Math.}, volume = {42}, number = {2}, year = {2023}, url = {https://doi.org/10.1007/s40314-023-02208-x}, doi = {10.1007/S40314-023-02208-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cam/HussainAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/GengLZW23, author = {Shengtao Geng and Jiahao Li and Xuncai Zhang and Yanfeng Wang}, title = {An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic {DNA} Coding}, journal = {Entropy}, volume = {25}, number = {8}, pages = {1178}, year = {2023}, url = {https://doi.org/10.3390/e25081178}, doi = {10.3390/E25081178}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/GengLZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/JiangYW23, author = {Qinmao Jiang and Simin Yu and Qianxue Wang}, title = {Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map}, journal = {Entropy}, volume = {25}, number = {3}, pages = {395}, year = {2023}, url = {https://doi.org/10.3390/e25030395}, doi = {10.3390/E25030395}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/JiangYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhuZY23, author = {Shuqin Zhu and Congxu Zhu and Hanyu Yan}, title = {Cryptanalyzing and Improving an Image Encryption Algorithm Based on Chaotic Dual Scrambling of Pixel Position and Bit}, journal = {Entropy}, volume = {25}, number = {3}, pages = {400}, year = {2023}, url = {https://doi.org/10.3390/e25030400}, doi = {10.3390/E25030400}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/ZhuZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ict-express/LiWZL23, author = {Cuiran Li and Jixuan Wu and Zepeng Zhang and Anqi Lv}, title = {Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption for {WSN}}, journal = {{ICT} Express}, volume = {9}, number = {6}, pages = {1077--1084}, year = {2023}, url = {https://doi.org/10.1016/j.icte.2023.05.006}, doi = {10.1016/J.ICTE.2023.05.006}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ict-express/LiWZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/TangZCZNH23, author = {Jianeng Tang and Zezong Zhang and Peiyang Chen and Feng Zhang and Hui Ni and Zhongming Huang}, title = {An image layered scrambling encryption algorithm based on a novel discrete chaotic map}, journal = {{IET} Image Process.}, volume = {17}, number = {2}, pages = {518--532}, year = {2023}, url = {https://doi.org/10.1049/ipr2.12651}, doi = {10.1049/IPR2.12651}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/TangZCZNH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/ZhengB23, author = {Jiming Zheng and Tianyu Bao}, title = {An image encryption algorithm based on cascade chaotic map and {DNA} coding}, journal = {{IET} Image Process.}, volume = {17}, number = {12}, pages = {3510--3523}, year = {2023}, url = {https://doi.org/10.1049/ipr2.12882}, doi = {10.1049/IPR2.12882}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ipr/ZhengB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/XuZ23, author = {Jiangjian Xu and Bing Zhao}, title = {Designing an Image Encryption Algorithm Based on Hyperchaotic System and {DCT}}, journal = {Int. J. Bifurc. Chaos}, volume = {33}, number = {2}, pages = {2350021:1--2350021:22}, year = {2023}, url = {https://doi.org/10.1142/S0218127423500219}, doi = {10.1142/S0218127423500219}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/XuZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/Li23, author = {Ju Li}, title = {Research on an optimised encryption algorithm for network information security communication}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {29}, number = {1}, pages = {31--46}, year = {2023}, url = {https://doi.org/10.1504/IJCNDS.2022.10044390}, doi = {10.1504/IJCNDS.2022.10044390}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/KiharaI23, author = {Maki Kihara and Satoshi Iriyama}, title = {Security Verification of an Authentication Algorithm Based on Verifiable Encryption}, journal = {Inf.}, volume = {14}, number = {2}, pages = {126}, year = {2023}, url = {https://doi.org/10.3390/info14020126}, doi = {10.3390/INFO14020126}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/KiharaI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdiq/SinghS23, author = {Kedar Nath Singh and Amit Kumar Singh}, title = {An Improved Encryption-Compression-based Algorithm for Securing Digital Images}, journal = {{ACM} J. Data Inf. Qual.}, volume = {15}, number = {2}, pages = {21:1--21:16}, year = {2023}, url = {https://doi.org/10.1145/3532783}, doi = {10.1145/3532783}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdiq/SinghS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/PrabhavathiAK23, author = {K. Prabhavathi and M. B. Anandaraju and Kiran}, title = {An efficient medical image encryption algorithm for telemedicine applications}, journal = {Microprocess. Microsystems}, volume = {101}, pages = {104907}, year = {2023}, url = {https://doi.org/10.1016/j.micpro.2023.104907}, doi = {10.1016/J.MICPRO.2023.104907}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/PrabhavathiAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChenYWGW23, author = {Xin Chen and Simin Yu and Qianxue Wang and Christophe Guyeux and Mengjie Wang}, title = {On the cryptanalysis of an image encryption algorithm with quantum chaotic map and {DNA} coding}, journal = {Multim. Tools Appl.}, volume = {82}, number = {27}, pages = {42717--42737}, year = {2023}, url = {https://doi.org/10.1007/s11042-023-15003-x}, doi = {10.1007/S11042-023-15003-X}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/ChenYWGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/JiangLZWCR23, author = {Donghua Jiang and Lidong Liu and Liya Zhu and Xingyuan Wang and Yingpin Chen and Xianwei Rong}, title = {An efficient meaningful double-image encryption algorithm based on parallel compressive sensing and {FRFT} embedding}, journal = {Multim. Tools Appl.}, volume = {82}, number = {18}, pages = {27337--27363}, year = {2023}, url = {https://doi.org/10.1007/s11042-023-14601-z}, doi = {10.1007/S11042-023-14601-Z}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/JiangLZWCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MurilloEscobarQCL23, author = {Miguel {\'{A}}ngel Murillo{-}Escobar and Jos{\'{e}} Alfonso Quintana{-}Ibarra and C{\'{e}}sar Cruz{-}Hern{\'{a}}ndez and Rosa Martha L{\'{o}}pez{-}Guti{\'{e}}rrez}, title = {Biosignal encryption algorithm based on Ushio chaotic map for e-health}, journal = {Multim. Tools Appl.}, volume = {82}, number = {15}, pages = {23373--23399}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-14092-4}, doi = {10.1007/S11042-022-14092-4}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/MurilloEscobarQCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/OmranpourLT23, author = {Hesam Omranpour and Zeynab Mohammadi Ledari and Masoumeh Taheri}, title = {Presentation of encryption method for {RGB} images based on an evolutionary algorithm using chaos functions and hash tables}, journal = {Multim. Tools Appl.}, volume = {82}, number = {6}, pages = {9343--9360}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-13734-x}, doi = {10.1007/S11042-022-13734-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/OmranpourLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ShafaiAAA23, author = {Walid El Shafai and Iman M. Almomani and Anees Ara and Aala Alkhayer}, title = {An optical-based encryption and authentication algorithm for color and grayscale medical images}, journal = {Multim. Tools Appl.}, volume = {82}, number = {15}, pages = {23735--23770}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-14093-3}, doi = {10.1007/S11042-022-14093-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ShafaiAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SharmaRB23, author = {Madhu Sharma and Ranjeet Kumar Ranjan and Vishal Bharti}, title = {An image encryption algorithm based on a novel hyperchaotic Henon sine map}, journal = {Multim. Tools Appl.}, volume = {82}, number = {8}, pages = {11949--11972}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-13733-y}, doi = {10.1007/S11042-022-13733-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SharmaRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XieGZ23, author = {Hongwei Xie and Ya{-}jun Gao and Hao Zhang}, title = {An image encryption algorithm based on novel block scrambling scheme and Josephus sequence generator}, journal = {Multim. Tools Appl.}, volume = {82}, number = {11}, pages = {16431--16453}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-14139-6}, doi = {10.1007/S11042-022-14139-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XieGZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhangWYL23, author = {Duzhong Zhang and Xiancheng Wen and Chao Yan and Taiyong Li}, title = {An image encryption algorithm based on joint RNA-level permutation and substitution}, journal = {Multim. Tools Appl.}, volume = {82}, number = {15}, pages = {23401--23426}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-14255-3}, doi = {10.1007/S11042-022-14255-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhangWYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhuZL23a, author = {Shuqin Zhu and Congxu Zhu and Xiujuan Li}, title = {An efficient chosen-plaintext attack and improvement on an image encryption algorithm based on cyclicshift and multiple chaotic map}, journal = {Multim. Tools Appl.}, volume = {82}, number = {15}, pages = {22835--22852}, year = {2023}, url = {https://doi.org/10.1007/s11042-023-14630-8}, doi = {10.1007/S11042-023-14630-8}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhuZL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nhm/LiQDS23, author = {Jin Li and Jinzheng Qu and Xibo Duan and Xiaoning Su}, title = {An image encryption algorithm based on heat flow cryptosystems}, journal = {Networks Heterog. Media}, volume = {18}, number = {3}, pages = {1260--1287}, year = {2023}, url = {https://doi.org/10.3934/nhm.2023055}, doi = {10.3934/NHM.2023055}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nhm/LiQDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AljreesKSS23, author = {Turki Aljrees and Ankit Kumar and Kamred Udham Singh and Teekam Singh}, title = {Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm}, journal = {Sensors}, volume = {23}, number = {19}, pages = {8090}, year = {2023}, url = {https://doi.org/10.3390/s23198090}, doi = {10.3390/S23198090}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AljreesKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/AlghamdiM23, author = {Yousef Alghamdi and Arslan Munir}, title = {An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {6}, pages = {713}, year = {2023}, url = {https://doi.org/10.1007/s42979-023-02172-7}, doi = {10.1007/S42979-023-02172-7}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sncs/AlghamdiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/NatiqRBMF23, author = {Hayder Natiq and Animesh Roy and Santo Banerjee and A. P. Misra and N. A. A. Fataf}, title = {Enhancing chaos in multistability regions of Duffing map for an image encryption algorithm}, journal = {Soft Comput.}, volume = {27}, number = {24}, pages = {19025--19043}, year = {2023}, url = {https://doi.org/10.1007/s00500-023-08170-4}, doi = {10.1007/S00500-023-08170-4}, timestamp = {Sat, 18 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/NatiqRBMF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcasI/LiGSC23, author = {Shih{-}Yu Li and Yanwen Gai and Kai{-}Chung Shih and Chin{-}Sheng Chen}, title = {An Efficient Image Encryption Algorithm Based on Innovative {DES} Structure and Hyperchaotic Keys}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {70}, number = {10}, pages = {4103--4111}, year = {2023}, url = {https://doi.org/10.1109/TCSI.2023.3296693}, doi = {10.1109/TCSI.2023.3296693}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcasI/LiGSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vc/WangC23, author = {Xingyuan Wang and Shengnan Chen}, title = {An image encryption algorithm based on pixel bit operation and nonlinear chaotic system}, journal = {Vis. Comput.}, volume = {39}, number = {7}, pages = {3123--3144}, year = {2023}, url = {https://doi.org/10.1007/s00371-022-02517-y}, doi = {10.1007/S00371-022-02517-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vc/WangC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/MaoAZ23, author = {Jiarong Mao and Yuting An and Xiaoyi Zhou}, title = {A Visually Meaningful Image Encryption Algorithm with Attention Mechanism and Artificial Bee Colony Optimization}, booktitle = {Asia Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2023, Taipei, Taiwan, October 31 - Nov. 3, 2023}, pages = {462--467}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/APSIPAASC58517.2023.10317534}, doi = {10.1109/APSIPAASC58517.2023.10317534}, timestamp = {Sat, 02 Dec 2023 14:05:45 +0100}, biburl = {https://dblp.org/rec/conf/apsipa/MaoAZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cqpc/GnatyukONPH23, author = {Sergiy Gnatyuk and Andrew Okhrimenko and Denys Navrotskyi and Dmytro Proskurin and Bohdan Horbakha}, editor = {Volodymyr Sokolov and Vasyl Ustimenko and Mariya Nazarkevych}, title = {Dataset of Cryptographic Algorithms for {UAV} Image Encryption based on Artificial Neural Networks (short paper)}, booktitle = {Proceedings of the Workshop on Classic, Quantum, and Post-Quantum Cryptography {(CQPC} 2023) co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2023), Kyiv, Ukraine, August 1, 2023 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3504}, pages = {63--71}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3504/short3.pdf}, timestamp = {Fri, 08 Dec 2023 14:24:28 +0100}, biburl = {https://dblp.org/rec/conf/cqpc/GnatyukONPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eenergy/ForsgrenBVM23, author = {Henrik Forsgren and Rickard Br{\"{a}}nnvall and Mattias Vesterlund and Tor Bj{\"{o}}rn Minde}, title = {Homomorphic Encryption Enables Data and Algorithm Confidentiality for Remote Monitoring and Control: An Application to Data Center Systems}, booktitle = {Companion Proceedings of the 14th {ACM} International Conference on Future Energy Systems, e-Energy 2023, Orlando, FL, USA, June 20-23, 2023}, pages = {85--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3599733.3600254}, doi = {10.1145/3599733.3600254}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eenergy/ForsgrenBVM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/CK23, author = {Naveen Rahite C and Manoj Senthil K}, title = {An In-Depth Review of Blowfish Encryption Algorithm: Security, Performance, and Application}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10307323}, doi = {10.1109/ICCCNT56998.2023.10307323}, timestamp = {Thu, 30 Nov 2023 16:40:53 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/CK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccel/Karageorgopoulou23, author = {Angeliki Karageorgopoulou and Vasileios Tsoukas and Georgios P. Spathoulas and Athanasios Kakarountas and Maria G. Koziri}, title = {Porting the Paillier Algorithm for Homomorphic Encryption on Portable Devices}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2023, Las Vegas, NV, USA, January 6-8, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCE56470.2023.10043586}, doi = {10.1109/ICCE56470.2023.10043586}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccel/Karageorgopoulou23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/Peesapaty23, author = {Sree Harsha Prada Peesapaty}, title = {{KILLS-1:} An Analysis on the Present Security Trends and Proposal of a Multilingual Encryption Algorithm}, booktitle = {{IEEE} International Carnahan Conference on Security Technology, {ICCST} 2023, Pune, India, October 11-15, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCST59048.2023.10474269}, doi = {10.1109/ICCST59048.2023.10474269}, timestamp = {Tue, 16 Apr 2024 14:15:02 +0200}, biburl = {https://dblp.org/rec/conf/iccst/Peesapaty23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitjo/MakkiA23, author = {Qasem H. Makki and Ayman M. Abdalla}, title = {An Image Encryption Algorithm Based on XOR, Flipping, Expansion Permutation and Shifting}, booktitle = {International Conference on Information Technology, {ICIT} 2023, Amman, Jordan, August 9-10, 2023}, pages = {700--704}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICIT58056.2023.10225920}, doi = {10.1109/ICIT58056.2023.10225920}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitjo/MakkiA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycsee/JinLX23, author = {Anan Jin and Xiang Li and Qingzhi Xiong}, editor = {Zhiwen Yu and Qilong Han and Hongzhi Wang and Bin Guo and Xiaokang Zhou and Xianhua Song and Zeguang Lu}, title = {Security Compressed Sensing Image Encryption Algorithm Based on Elliptic Curve}, booktitle = {Data Science - 9th International Conference of Pioneering Computer Scientists, Engineers and Educators, {ICPCSEE} 2023, Harbin, China, September 22-24, 2023, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {1879}, pages = {350--360}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-5968-6\_25}, doi = {10.1007/978-981-99-5968-6\_25}, timestamp = {Tue, 23 Apr 2024 16:53:02 +0200}, biburl = {https://dblp.org/rec/conf/icycsee/JinLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/BadrFA23, author = {Aymen Mudheher Badr and Lamia Chaari Fourati and Samiha Ayed}, title = {An Improved {GIFT} Lightweight Encryption Algorithm to Protect Medical Data In IoT}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth, Tunisia, July 9-12, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISCC58397.2023.10218067}, doi = {10.1109/ISCC58397.2023.10218067}, timestamp = {Wed, 06 Sep 2023 08:09:43 +0200}, biburl = {https://dblp.org/rec/conf/iscc/BadrFA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/niss/KattassRJAJB23, author = {Mourad Kattass and Hicham Rrghout and Abdellatif Jarjar and Abdellah Abid and Mariem Jarjar and Abdelhamid Benazzi}, title = {An Efficient Image Encryption Algorithm using Chaotic S-boxes of Pseudo-random Size}, booktitle = {Proceedings of the 6th International Conference on Networking, Intelligent Systems {\&} Security, Larache, Morocco, May 24-26, 2023}, pages = {32:1--32:6}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607720.3607754}, doi = {10.1145/3607720.3607754}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/niss/KattassRJAJB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-01923, author = {Dominic Gold and Koray Karabina and Francis C. Motta}, title = {An Algorithm for Persistent Homology Computation Using Homomorphic Encryption}, journal = {CoRR}, volume = {abs/2307.01923}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.01923}, doi = {10.48550/ARXIV.2307.01923}, eprinttype = {arXiv}, eprint = {2307.01923}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-01923.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldKM23, author = {Dominic Gold and Koray Karabina and Francis C. Motta}, title = {An Algorithm for Persistent Homology Computation Using Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1048}, year = {2023}, url = {https://eprint.iacr.org/2023/1048}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiHSWZ22, author = {Haixiao Li and Yinan Hu and Ziming Shi and Bin Wang and Pan Zheng}, title = {An Image Encryption Algorithm Based on Improved Lifting-Like Structure and Cross-Plane Zigzag Transform}, journal = {{IEEE} Access}, volume = {10}, pages = {82305--82318}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3194730}, doi = {10.1109/ACCESS.2022.3194730}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiHSWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangK22, author = {Jihye Yang and Kee Sung Kim}, title = {An Efficient Update Algorithm for Mutable Order-Preserving Encryption}, journal = {{IEEE} Access}, volume = {10}, pages = {102009--102018}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3208958}, doi = {10.1109/ACCESS.2022.3208958}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/KumarVB22, author = {C. Madan Kumar and R. Vidhya and M. Brindha}, title = {An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function}, journal = {Appl. Intell.}, volume = {52}, number = {3}, pages = {2556--2585}, year = {2022}, url = {https://doi.org/10.1007/s10489-021-02508-x}, doi = {10.1007/S10489-021-02508-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/KumarVB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/ZhengZ22a, author = {Jiming Zheng and Qingxia Zeng}, title = {An image encryption algorithm using a dynamic S-box and chaotic maps}, journal = {Appl. Intell.}, volume = {52}, number = {13}, pages = {15703--15717}, year = {2022}, url = {https://doi.org/10.1007/s10489-022-03174-3}, doi = {10.1007/S10489-022-03174-3}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/ZhengZ22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/Al-KhasawnehUSK22, author = {Mahmoud Ahmad Al{-}Khasawneh and Irfan Uddin and Syed Atif Ali Shah and Ahmad M. Khasawneh and Laith Mohammad Abualigah and Marwan Mahmoud}, title = {An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications}, journal = {Clust. Comput.}, volume = {25}, number = {2}, pages = {999--1013}, year = {2022}, url = {https://doi.org/10.1007/s10586-021-03466-2}, doi = {10.1007/S10586-021-03466-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/Al-KhasawnehUSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computation/KapalovaSAD22, author = {Nursulu Kapalova and Kairat Sakan and Kunbolat Algazy and Dilmukhanbet Dyusenbayev}, title = {Development and Study of an Encryption Algorithm}, journal = {Comput.}, volume = {10}, number = {11}, pages = {198}, year = {2022}, url = {https://doi.org/10.3390/computation10110198}, doi = {10.3390/COMPUTATION10110198}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computation/KapalovaSAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/AbusukhonMA22, author = {Ahmad Abusukhon and Zeyad Mohammad and Ali Al{-}Thaher}, title = {An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text-to-image encryption algorithm}, journal = {Concurr. Comput. Pract. Exp.}, volume = {34}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/cpe.6649}, doi = {10.1002/CPE.6649}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/AbusukhonMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/FanLZLL22, author = {Haiju Fan and Heng Lu and Chenjiu Zhang and Ming Li and Yanfang Liu}, title = {Cryptanalysis of an Image Encryption Algorithm Based on Random Walk and Hyperchaotic Systems}, journal = {Entropy}, volume = {24}, number = {1}, pages = {40}, year = {2022}, url = {https://doi.org/10.3390/e24010040}, doi = {10.3390/E24010040}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/FanLZLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/LiuLFLWM22, author = {Guangzhe Liu and Wei Li and Xingkui Fan and Zhuang Li and Yuxuan Wang and Hongyang Ma}, title = {An Image Encryption Algorithm Based on Discrete-Time Alternating Quantum Walk and Advanced Encryption Standard}, journal = {Entropy}, volume = {24}, number = {5}, pages = {608}, year = {2022}, url = {https://doi.org/10.3390/e24050608}, doi = {10.3390/E24050608}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/LiuLFLWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/MengLDSJ22, author = {Xin Meng and Jinqing Li and Xiaoqiang Di and Yaohui Sheng and Donghua Jiang}, title = {An Encryption Algorithm for Region of Interest in Medical {DICOM} Based on One-Dimensional e{\(\lambda\)}-cos-cot Map}, journal = {Entropy}, volume = {24}, number = {7}, pages = {901}, year = {2022}, url = {https://doi.org/10.3390/e24070901}, doi = {10.3390/E24070901}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/MengLDSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ShengLDLX22, author = {Yaohui Sheng and Jinqing Li and Xiaoqiang Di and Xusheng Li and Rui Xu}, title = {An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion}, journal = {Entropy}, volume = {24}, number = {9}, pages = {1247}, year = {2022}, url = {https://doi.org/10.3390/e24091247}, doi = {10.3390/E24091247}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/ShengLDLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/SongSZW22, author = {Xiaomeng Song and Mengna Shi and Yanqi Zhou and Erfu Wang}, title = {An Image Compression Encryption Algorithm Based on Chaos and {ZUC} Stream Cipher}, journal = {Entropy}, volume = {24}, number = {5}, pages = {742}, year = {2022}, url = {https://doi.org/10.3390/e24050742}, doi = {10.3390/E24050742}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/SongSZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhangCC22, author = {Chengrui Zhang and Junxin Chen and Dongming Chen}, title = {Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic Map}, journal = {Entropy}, volume = {24}, number = {11}, pages = {1551}, year = {2022}, url = {https://doi.org/10.3390/e24111551}, doi = {10.3390/E24111551}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/ZhangCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhengB22, author = {Jiming Zheng and Tianyu Bao}, title = {An Image Encryption Algorithm Using Cascade Chaotic Map and S-Box}, journal = {Entropy}, volume = {24}, number = {12}, pages = {1827}, year = {2022}, url = {https://doi.org/10.3390/e24121827}, doi = {10.3390/E24121827}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/ZhengB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/LiMCB22, author = {Xuejun Li and Jun Mou and Yinghong Cao and Santo Banerjee}, title = {An Optical Image Encryption Algorithm Based on a Fractional-Order Laser Hyperchaotic System}, journal = {Int. J. Bifurc. Chaos}, volume = {32}, number = {3}, pages = {2250035:1--2250035:25}, year = {2022}, url = {https://doi.org/10.1142/S0218127422500353}, doi = {10.1142/S0218127422500353}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijbc/LiMCB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/ParvazYB22, author = {Reza Parvaz and Yavar Khedmati Yengejeh and Yousef Behroo}, title = {A New 4D Chaos System with an Encryption Algorithm for Color and Grayscale Images}, journal = {Int. J. Bifurc. Chaos}, volume = {32}, number = {14}, pages = {2250214:1--2250214:25}, year = {2022}, url = {https://doi.org/10.1142/S0218127422502145}, doi = {10.1142/S0218127422502145}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/ParvazYB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/ZhangWZHZ22, author = {Wei Zhang and Shuwen Wang and Guangdong Zhu and Weijie Han and Zhiliang Zhu}, title = {An Image Encryption Algorithm Based on an Epidemic Spreading Model}, journal = {Int. J. Bifurc. Chaos}, volume = {32}, number = {10}, pages = {2250142:1--2250142:19}, year = {2022}, url = {https://doi.org/10.1142/S0218127422501425}, doi = {10.1142/S0218127422501425}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/ZhangWZHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/AhmadAAAAZA22, author = {Musheer Ahmad and Shafali Agarwal and Ahmed Alkhayyat and Adi Alhudhaif and Fayadh Alenezi and Amjad Hussain Zahid and Nojood O. Aljehane}, title = {An image encryption algorithm based on new generalized fusion fractal structure}, journal = {Inf. Sci.}, volume = {592}, pages = {1--20}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.01.042}, doi = {10.1016/J.INS.2022.01.042}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/AhmadAAAAZA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangLJ22, author = {Xingyuan Wang and Cheng Liu and Donghua Jiang}, title = {An efficient double-image encryption and hiding algorithm using a newly designed chaotic system and parallel compressive sensing}, journal = {Inf. Sci.}, volume = {610}, pages = {300--325}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.08.002}, doi = {10.1016/J.INS.2022.08.002}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/AnandkumarK22, author = {Ramakrishnan Anandkumar and Ramanujam Kalpana}, title = {A Fibonacci p-code traversing and unified chaotic map-based image encryption algorithm}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {13}, number = {8}, pages = {3713--3727}, year = {2022}, url = {https://doi.org/10.1007/s12652-021-03659-y}, doi = {10.1007/S12652-021-03659-Y}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/AnandkumarK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/SammetaP22, author = {Naresh Sammeta and Latha Parthiban}, title = {An optimal elliptic curve cryptography based encryption algorithm for blockchain-enabled medical image transmission}, journal = {J. Intell. Fuzzy Syst.}, volume = {43}, number = {6}, pages = {8275--8287}, year = {2022}, url = {https://doi.org/10.3233/JIFS-211216}, doi = {10.3233/JIFS-211216}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/SammetaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/GaoMBCXC22, author = {Xinyu Gao and Jun Mou and Santo Banerjee and Yinghong Cao and Li Xiong and Xiaoyang Chen}, title = {An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {4}, pages = {1535--1551}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2022.01.017}, doi = {10.1016/J.JKSUCI.2022.01.017}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/GaoMBCXC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/IsmailM22, author = {Nur Hidayah Mohammad Ismail and Md Yushalify Misro}, title = {An improved image encryption algorithm based on B{\'{e}}zier coefficients matrix}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {10 Part {B}}, pages = {10056--10067}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2022.10.005}, doi = {10.1016/J.JKSUCI.2022.10.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/IsmailM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/HadjadjSABK22, author = {Mahieddine Anouar Hadjadj and Said Sadoudi and Mohamed Salah Azzaz and Hichem Bendecheche and Redouane Kaibou}, title = {A new hardware architecture of lightweight and efficient real-time video chaos-based encryption algorithm}, journal = {J. Real Time Image Process.}, volume = {19}, number = {6}, pages = {1049--1062}, year = {2022}, url = {https://doi.org/10.1007/s11554-022-01244-w}, doi = {10.1007/S11554-022-01244-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/HadjadjSABK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/FangJYWZ22, author = {Jie Fang and Minghao Jiang and Nannan Yin and Da Wei and Yin Zhang}, title = {An image block encryption algorithm based on hyperchaotic system and {DNA} encoding}, journal = {Multim. Tools Appl.}, volume = {81}, number = {12}, pages = {17245--17262}, year = {2022}, url = {https://doi.org/10.1007/s11042-022-12604-w}, doi = {10.1007/S11042-022-12604-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/FangJYWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuangCZZY22, author = {Yibo Huang and Tengfei Chen and Qiu{-}yu Zhang and Yuan Zhang and Shaohui Yan}, title = {Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum}, journal = {Multim. Tools Appl.}, volume = {81}, number = {18}, pages = {25829--25852}, year = {2022}, url = {https://doi.org/10.1007/s11042-022-12746-x}, doi = {10.1007/S11042-022-12746-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HuangCZZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/LiangQZ22, author = {Zhongyue Liang and Qiuxia Qin and Changjun Zhou}, title = {An image encryption algorithm based on Fibonacci Q-matrix and genetic algorithm}, journal = {Neural Comput. Appl.}, volume = {34}, number = {21}, pages = {19313--19341}, year = {2022}, url = {https://doi.org/10.1007/s00521-022-07493-x}, doi = {10.1007/S00521-022-07493-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/LiangQZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/FengZLZSSL22, author = {Yanyan Feng and Jian Zhou and Jie Li and Wei Zhao and Jinjing Shi and Ronghua Shi and Wei Li}, title = {{SKC-CCCO:} an encryption algorithm for quantum group signature}, journal = {Quantum Inf. Process.}, volume = {21}, number = {9}, pages = {328}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03664-w}, doi = {10.1007/S11128-022-03664-W}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/FengZLZSSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LuoOLCZ22, author = {Yuling Luo and Xue Ouyang and Junxiu Liu and Lvchen Cao and Yanli Zou}, title = {An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system}, journal = {Soft Comput.}, volume = {26}, number = {11}, pages = {5409--5435}, year = {2022}, url = {https://doi.org/10.1007/s00500-021-06554-y}, doi = {10.1007/S00500-021-06554-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/LuoOLCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/Yang22a, author = {Na Yang}, title = {An identity-based encryption online/offline {(IBOOE)} algorithm for securing wireless sensor networks}, journal = {Wirel. Networks}, volume = {28}, number = {8}, pages = {3493--3502}, year = {2022}, url = {https://doi.org/10.1007/s11276-022-03026-5}, doi = {10.1007/S11276-022-03026-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/Yang22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ElkamchouchiAA22, author = {Hassan M. Elkamchouchi and Rosemarie Anton and Yasmine Abouelseoud}, title = {New Encryption Algorithm for Secure Image Transmission Through Open Network}, journal = {Wirel. Pers. Commun.}, volume = {125}, number = {1}, pages = {45--62}, year = {2022}, url = {https://doi.org/10.1007/s11277-022-09540-1}, doi = {10.1007/S11277-022-09540-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ElkamchouchiAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aipr2/BuX22, author = {Wei Bu and Shucui Xie}, title = {An Efficient Image Encryption Algorithm Based on Hyperchaotic and Two Times of Scrambling Diffusion}, booktitle = {Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, {AIPR} 2022, Xiamen, China, September 23-25, 2022}, pages = {562--571}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3573942.3574063}, doi = {10.1145/3573942.3574063}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aipr2/BuX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/WangCZC22, author = {Chunping Wang and Jiahui Chen and Xiaoli Zhang and Hongbing Cheng}, title = {An Efficient Fully Homomorphic Encryption Sorting Algorithm Using Addition Over {TFHE}}, booktitle = {28th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2022, Nanjing, China, January 10-12, 2023}, pages = {226--233}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICPADS56603.2022.00037}, doi = {10.1109/ICPADS56603.2022.00037}, timestamp = {Thu, 06 Apr 2023 14:52:40 +0200}, biburl = {https://dblp.org/rec/conf/icpads/WangCZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/radioelektronika/OravecOA22, author = {Jakub Oravec and Lubos Ovsen{\'{\i}}k and Samuel Andrejc{\'{\i}}k}, title = {An Image Encryption Algorithm with an Efficient Quantization Scheme}, booktitle = {32nd International Conference Radioelektronika, {RADIOELEKTRONIKA} 2022, Kosice, Slovakia, April 21-22, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/RADIOELEKTRONIKA54537.2022.9764931}, doi = {10.1109/RADIOELEKTRONIKA54537.2022.9764931}, timestamp = {Fri, 27 May 2022 13:55:45 +0200}, biburl = {https://dblp.org/rec/conf/radioelektronika/OravecOA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PoniszewskaMarandaP22, author = {Aneta Poniszewska{-}Maranda and Kacper Pradzynski}, title = {Code-based encryption algorithms for generating and verifying digital signature}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {465--472}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00071}, doi = {10.1109/TRUSTCOM56396.2022.00071}, timestamp = {Mon, 27 Mar 2023 16:44:39 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PoniszewskaMarandaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-06774, author = {Chengqing Li and Xianhui Shen and Sheng Liu}, title = {Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map}, journal = {CoRR}, volume = {abs/2208.06774}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.06774}, doi = {10.48550/ARXIV.2208.06774}, eprinttype = {arXiv}, eprint = {2208.06774}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-06774.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ElghandourSEK21, author = {Aesha N. Elghandour and Ahmed M. Salah and Yasser A. Elmasry and Abdelrahman A. Karawia}, title = {An Image Encryption Algorithm Based on Bisection Method and One-Dimensional Piecewise Chaotic Map}, journal = {{IEEE} Access}, volume = {9}, pages = {43411--43421}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3065810}, doi = {10.1109/ACCESS.2021.3065810}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ElghandourSEK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuCXMY21, author = {Haiying Hu and Yinghong Cao and Ji Xu and Chenguang Ma and Huizhen Yan}, title = {An Image Compression and Encryption Algorithm Based on the Fractional-Order Simplest Chaotic Circuit}, journal = {{IEEE} Access}, volume = {9}, pages = {22141--22155}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3054842}, doi = {10.1109/ACCESS.2021.3054842}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuCXMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangJALW21, author = {Wei Huang and Donghua Jiang and Yisheng An and Lidong Liu and Xingyuan Wang}, title = {A Novel Double-Image Encryption Algorithm Based on Rossler Hyperchaotic System and Compressive Sensing}, journal = {{IEEE} Access}, volume = {9}, pages = {41704--41716}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3065453}, doi = {10.1109/ACCESS.2021.3065453}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HuangJALW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/connection/JiZSHL21, author = {Honghan Ji and Hongjie Zhang and Lisong Shao and Debiao He and Min Luo}, title = {An efficient attribute-based encryption scheme based on {SM9} encryption algorithm for dispatching and control cloud}, journal = {Connect. Sci.}, volume = {33}, number = {4}, pages = {1094--1115}, year = {2021}, url = {https://doi.org/10.1080/09540091.2020.1858757}, doi = {10.1080/09540091.2020.1858757}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/connection/JiZSHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/SusiloTY21, author = {Willy Susilo and Joseph Tonien and Guomin Yang}, title = {Divide and capture: An improved cryptanalysis of the encryption standard algorithm {RSA}}, journal = {Comput. Stand. Interfaces}, volume = {74}, pages = {103470}, year = {2021}, url = {https://doi.org/10.1016/j.csi.2020.103470}, doi = {10.1016/J.CSI.2020.103470}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/SusiloTY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/OravecOP21, author = {Jakub Oravec and Lubos Ovsen{\'{\i}}k and J{\'{a}}n Papaj}, title = {An Image Encryption Algorithm Using Logistic Map with Plaintext-Related Parameter Values}, journal = {Entropy}, volume = {23}, number = {11}, pages = {1373}, year = {2021}, url = {https://doi.org/10.3390/e23111373}, doi = {10.3390/E23111373}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/OravecOP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhuZ21a, author = {Shuqin Zhu and Congxu Zhu}, title = {An Efficient Chosen-Plaintext Attack on an Image Fusion Encryption Algorithm Based on {DNA} Operation and Hyperchaos}, journal = {Entropy}, volume = {23}, number = {7}, pages = {804}, year = {2021}, url = {https://doi.org/10.3390/e23070804}, doi = {10.3390/E23070804}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/ZhuZ21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/OravecOP21, author = {Jakub Oravec and Lubos Ovsen{\'{\i}}k and J{\'{a}}n Papaj}, title = {An image encryption algorithm with a plaintext-related quantisation scheme}, journal = {{IET} Image Process.}, volume = {15}, number = {9}, pages = {2039--2055}, year = {2021}, url = {https://doi.org/10.1049/ipr2.12174}, doi = {10.1049/IPR2.12174}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/OravecOP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KatukC21, author = {Norliza Katuk and Ikenna Rene Chiadighikaobi}, title = {An Enhanced Block Pre-processing of {PRESENT} Algorithm for Fingerprint Template Encryption in the Internet of Things Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.17762/ijcnis.v13i3.5101}, doi = {10.17762/IJCNIS.V13I3.5101}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KatukC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/KatukC21a, author = {Norliza Katuk and Ikenna Rene Chiadighikaobi}, title = {An Enhanced Block Pre-processing of {PRESENT} Algorithm for Fingerprint Template Encryption in the Internet of Things Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {13}, number = {3}, year = {2021}, url = {https://doi.org/10.54039/ijcnis.v13i3.5101}, doi = {10.54039/IJCNIS.V13I3.5101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnis/KatukC21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SonAT21, author = {Le Dinh Son and Tran Van An and Nguyen Ngoc Thuy}, title = {Improving the asymmetric encryption algorithm based on genetic algorithm, application in online information transmission}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {13}, number = {6}, pages = {612--629}, year = {2021}, url = {https://doi.org/10.1504/IJESDF.2021.118543}, doi = {10.1504/IJESDF.2021.118543}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SonAT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangZ21, author = {Xingyuan Wang and Maozhen Zhang}, title = {An image encryption algorithm based on new chaos and diffusion values of a truth table}, journal = {Inf. Sci.}, volume = {579}, pages = {128--149}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.07.096}, doi = {10.1016/J.INS.2021.07.096}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/BashierJ21, author = {Eihab Bashier and Taoufik Ben Jabeur}, title = {An efficient secure image encryption algorithm based on total shuffling, integer chaotic maps and median filter}, journal = {J. Internet Serv. Inf. Secur.}, volume = {11}, number = {2}, pages = {46--77}, year = {2021}, url = {https://doi.org/10.22667/JISIS.2021.05.31.046}, doi = {10.22667/JISIS.2021.05.31.046}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/BashierJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/ZhangHZ21, author = {Shuai Zhang and Liqun Huang and Mingxu Zhu}, title = {Joint Encryption Scheme Based on the Chaotic {DCT} Matrix and {SLM} Algorithm in an {OFDM-PON} System}, journal = {Mob. Inf. Syst.}, volume = {2021}, pages = {8840664:1--8840664:9}, year = {2021}, url = {https://doi.org/10.1155/2021/8840664}, doi = {10.1155/2021/8840664}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/ZhangHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/Al-MaadeedHAM21, author = {Temadher Alassiry Al{-}Maadeed and Iqtadar Hussain and Amir Anees and Muhammad Tahir Mustafa}, title = {A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes}, journal = {Multim. Tools Appl.}, volume = {80}, number = {16}, pages = {24801--24822}, year = {2021}, url = {https://doi.org/10.1007/s11042-021-10695-5}, doi = {10.1007/S11042-021-10695-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/Al-MaadeedHAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/BhattiYYLNMZ21, author = {Uzair Aslam Bhatti and Linwang Yuan and Zhaoyuan Yu and Jingbing Li and Saqib Ali Nawaz and Anum Mehmood and Kun Zhang}, title = {New watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryption}, journal = {Multim. Tools Appl.}, volume = {80}, number = {9}, pages = {13367--13387}, year = {2021}, url = {https://doi.org/10.1007/s11042-020-10257-1}, doi = {10.1007/S11042-020-10257-1}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/BhattiYYLNMZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/DouL21, author = {Yuqiang Dou and Ming Li}, title = {An image encryption algorithm based on a novel 1D chaotic map and compressive sensing}, journal = {Multim. Tools Appl.}, volume = {80}, number = {16}, pages = {24437--24454}, year = {2021}, url = {https://doi.org/10.1007/s11042-021-10850-y}, doi = {10.1007/S11042-021-10850-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/DouL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/El-KhamyM21, author = {Said E. El{-}Khamy and Amira G. Mohamed}, title = {An efficient DNA-inspired image encryption algorithm based on hyper-chaotic maps and wavelet fusion}, journal = {Multim. Tools Appl.}, volume = {80}, number = {15}, pages = {23319--23335}, year = {2021}, url = {https://doi.org/10.1007/s11042-021-10527-6}, doi = {10.1007/S11042-021-10527-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/El-KhamyM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HafsaSMM21, author = {Amal Hafsa and Anissa Sghaier and Jihene Malek and Mohsen Machhout}, title = {Image encryption method based on improved {ECC} and modified {AES} algorithm}, journal = {Multim. Tools Appl.}, volume = {80}, number = {13}, pages = {19769--19801}, year = {2021}, url = {https://doi.org/10.1007/s11042-021-10700-x}, doi = {10.1007/S11042-021-10700-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HafsaSMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WangXA21, author = {Xingyuan Wang and Wenhua Xue and Jubai An}, title = {Image encryption algorithm based on {LDCML} and {DNA} coding sequence}, journal = {Multim. Tools Appl.}, volume = {80}, number = {1}, pages = {591--614}, year = {2021}, url = {https://doi.org/10.1007/s11042-020-09688-7}, doi = {10.1007/S11042-020-09688-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WangXA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhangHZY21, author = {Wei Zhang and Weijie Han and Zhiliang Zhu and Hai Yu}, title = {An ultrahigh-resolution image encryption algorithm using random super-pixel strategy}, journal = {Multim. Tools Appl.}, volume = {80}, number = {24}, pages = {33429--33454}, year = {2021}, url = {https://doi.org/10.1007/s11042-021-11096-4}, doi = {10.1007/S11042-021-11096-4}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhangHZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LinL21, author = {Riguang Lin and Sheng Li}, title = {An Image Encryption Scheme Based on Lorenz Hyperchaotic System and {RSA} Algorithm}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5586959:1--5586959:18}, year = {2021}, url = {https://doi.org/10.1155/2021/5586959}, doi = {10.1155/2021/5586959}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LinL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tds/LinX21, author = {Chuan Lin and Xinpeng Xu}, title = {An Electronic Bill Encryption Algorithm Based on Multiple Watermark Encryption}, journal = {Traitement du Signal}, volume = {38}, number = {1}, pages = {127--133}, year = {2021}, url = {https://doi.org/10.18280/ts.380113}, doi = {10.18280/TS.380113}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tds/LinX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/TanCHGL21, author = {Weihang Tan and Benjamin M. Case and Gengran Hu and Shuhong Gao and Yingjie Lao}, title = {An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme}, journal = {J. Signal Process. Syst.}, volume = {93}, number = {6}, pages = {643--656}, year = {2021}, url = {https://doi.org/10.1007/s11265-020-01608-0}, doi = {10.1007/S11265-020-01608-0}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/TanCHGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/GuptaGKSKS21, author = {Manish Gupta and Kamlesh Kumar Gupta and Mohammad Reza Khosravi and Piyush Kumar Shukla and Sandeep Kautish and Achyut Shankar}, title = {An Intelligent Session Key-Based Hybrid Lightweight Image Encryption Algorithm Using Logistic-Tent Map and Crossover Operator for Internet of Multimedia Things}, journal = {Wirel. Pers. Commun.}, volume = {121}, number = {3}, pages = {1857--1878}, year = {2021}, url = {https://doi.org/10.1007/s11277-021-08742-3}, doi = {10.1007/S11277-021-08742-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/GuptaGKSKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdiot2/AzzabyASK21, author = {Fouzia El Azzaby and Nabil El Akkad and Khalid Sabour and Samir Kabbaj}, editor = {Mohamed Lazaar and Claude Duvallet and Abdellah Touhafi and Mohammed Al Achhab}, title = {An {RGB} Image Encryption Algorithm Based on Clifford Attractors with a Bilinear Transformation}, booktitle = {BDIoT'21: Proceedings of the 5th International Conference on Big Data and Internet of Things, Rabat, Morocco, March 17-18, 2021}, series = {Lecture Notes in Networks and Systems}, volume = {489}, pages = {116--127}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-07969-6\_9}, doi = {10.1007/978-3-031-07969-6\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdiot2/AzzabyASK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai2/DincaA021, author = {Alexandru Dinca and Nicoleta Angelescu and Dan Popescu}, title = {Web Data Management Platform Integrating Encryption Algorithms}, booktitle = {13th International Conference on Electronics, Computers and Artificial Intelligence, {ECAI} 2021, Pitesti, Romania, July 1-3, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ECAI52376.2021.9515036}, doi = {10.1109/ECAI52376.2021.9515036}, timestamp = {Fri, 01 Apr 2022 11:05:28 +0200}, biburl = {https://dblp.org/rec/conf/ecai2/DincaA021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icct/SongSZW21, author = {Xiaomeng Song and Mengna Shi and Yanqi Zhou and Erfu Wang}, title = {An Block Image Encryption Algorithm Based on Reversible Cellular Automata}, booktitle = {21st International Conference on Communication Technology, {ICCT} 2021, Tianjin, China, October 13-16, 2021}, pages = {1167--1172}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCT52962.2021.9658087}, doi = {10.1109/ICCT52962.2021.9658087}, timestamp = {Tue, 11 Jan 2022 10:02:53 +0100}, biburl = {https://dblp.org/rec/conf/icct/SongSZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/TangBDGH21, author = {Jianchao Tang and Liyong Bao and Hongwei Ding and Zheng Guan and Min He}, editor = {Yuxin Peng and Shi{-}Min Hu and Moncef Gabbouj and Kun Zhou and Michael Elad and Kun Xu}, title = {An Improved Digital Image Encryption Algorithm Based on Sine Compound Chaotic System}, booktitle = {Image and Graphics - 11th International Conference, {ICIG} 2021, Haikou, China, August 6-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12888}, pages = {676--687}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-87355-4\_56}, doi = {10.1007/978-3-030-87355-4\_56}, timestamp = {Wed, 16 Mar 2022 23:55:43 +0100}, biburl = {https://dblp.org/rec/conf/icig/TangBDGH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/AlibrahimL21a, author = {Hussain Alibrahim and Simone A. Ludwig}, title = {Image Encryption Algorithm based on Particle Swarm Optimization and Chaos Logistic Map}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2021, Orlando, FL, USA, December 5-7, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SSCI50451.2021.9659975}, doi = {10.1109/SSCI50451.2021.9659975}, timestamp = {Thu, 03 Feb 2022 09:28:31 +0100}, biburl = {https://dblp.org/rec/conf/ssci/AlibrahimL21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChiritaSSS21, author = {Madalina Chirita and Alexandru{-}Mihai Stroie and Andrei{-}Daniel Safta and Emil Simion}, title = {A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2021}, url = {https://eprint.iacr.org/2021/102}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChiritaSSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaoTHGZ21, title = {{IIBE:} An Improved Identity-Based Encryption Algorithm for {WSN} Security}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {8527068:1--8527068:8}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1155/2021/8527068}, doi = {10.1155/2021/8527068}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/CaoTHGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BhattiYLNMZY20, author = {Uzair Aslam Bhatti and Zhaoyuan Yu and Jingbing Li and Saqib Ali Nawaz and Anum Mehmood and Kun Zhang and Linwang Yuan}, title = {Hybrid Watermarking Algorithm Using Clifford Algebra With Arnold Scrambling and Chaotic Encryption}, journal = {{IEEE} Access}, volume = {8}, pages = {76386--76398}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2988298}, doi = {10.1109/ACCESS.2020.2988298}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BhattiYLNMZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DouL20, author = {Yuqiang Dou and Ming Li}, title = {An Image Encryption Algorithm Based on Compressive Sensing and {M} Sequence}, journal = {{IEEE} Access}, volume = {8}, pages = {220646--220657}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3043240}, doi = {10.1109/ACCESS.2020.3043240}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DouL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoJZXW20, author = {Yuan Guo and Shiwei Jing and Yanyan Zhou and Xin Xu and Liansuo Wei}, title = {An Image Encryption Algorithm Based on Logistic-Fibonacci Cascade Chaos and 3D Bit Scrambling}, journal = {{IEEE} Access}, volume = {8}, pages = {9896--9912}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2963717}, doi = {10.1109/ACCESS.2019.2963717}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuoJZXW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuJAG20, author = {Lidong Liu and Donghua Jiang and Tingyu An and Yifan Guan}, title = {A Plaintext-Related Dynamical Image Encryption Algorithm Based on Permutation-Combination-Diffusion Architecture}, journal = {{IEEE} Access}, volume = {8}, pages = {62785--62799}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2983716}, doi = {10.1109/ACCESS.2020.2983716}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiuJAG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MuhammadO20, author = {Zahir Muhammed Ziad Muhammad and Fatih {\"{O}}zkaynak}, title = {An Image Encryption Algorithm Based on Chaotic Selection of Robust Cryptographic Primitives}, journal = {{IEEE} Access}, volume = {8}, pages = {56581--56589}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2982827}, doi = {10.1109/ACCESS.2020.2982827}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MuhammadO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangS20a, author = {Xingyuan Wang and Yining Su}, title = {An Audio Encryption Algorithm Based on {DNA} Coding and Chaotic System}, journal = {{IEEE} Access}, volume = {8}, pages = {9260--9270}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2963329}, doi = {10.1109/ACCESS.2019.2963329}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangWXWW20, author = {Hao Zhang and Xiaoqing Wang and Hongwei Xie and Chunpeng Wang and Xingyuan Wang}, title = {An Efficient and Secure Image Encryption Algorithm Based on Non- Adjacent Coupled Maps}, journal = {{IEEE} Access}, volume = {8}, pages = {122104--122120}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3006513}, doi = {10.1109/ACCESS.2020.3006513}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangWXWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhangWHYZ20, author = {Wei Zhang and Shuwen Wang and Weijie Han and Hai Yu and Zhiliang Zhu}, title = {An Image Encryption Algorithm Based on Random Hamiltonian Path}, journal = {Entropy}, volume = {22}, number = {1}, pages = {73}, year = {2020}, url = {https://doi.org/10.3390/e22010073}, doi = {10.3390/E22010073}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/ZhangWHYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/XuSW20, author = {Cong Xu and Jingru Sun and Chunhua Wang}, title = {An Image Encryption Algorithm Based on Random Walk and Hyperchaotic Systems}, journal = {Int. J. Bifurc. Chaos}, volume = {30}, number = {4}, pages = {2050060:1--2050060:16}, year = {2020}, url = {https://doi.org/10.1142/S0218127420500601}, doi = {10.1142/S0218127420500601}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/XuSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/YeJWPH20, author = {Guodong Ye and Kaixin Jiao and Huishan Wu and Chen Pan and Xiaoling Huang}, title = {An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the {RSA} Public-Key Cryptosystem}, journal = {Int. J. Bifurc. Chaos}, volume = {30}, number = {15}, pages = {2050233:1--2050233:17}, year = {2020}, url = {https://doi.org/10.1142/S0218127420502338}, doi = {10.1142/S0218127420502338}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/YeJWPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LiDYL20, author = {Hao Li and Lianbing Deng and Cheng Yang and Jianbo Liu}, title = {An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {2}, year = {2020}, url = {https://doi.org/10.1177/1550147720908196}, doi = {10.1177/1550147720908196}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/LiDYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MengYZLS20, author = {Lei Meng and Shoulin Yin and Chu Zhao and Hang Li and Yang Sun}, title = {An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain}, journal = {Int. J. Netw. Secur.}, volume = {22}, number = {1}, pages = {155--160}, year = {2020}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p155-160.pdf}, timestamp = {Wed, 18 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MengYZLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmip/KrishnanJR20, author = {K. Sundara Krishnan and B. Jaison and S. P. Raja}, title = {An efficient novel color image encryption algorithm based on 3D L{\"{u}} chaotic dynamical system and {SHA-512}}, journal = {Int. J. Wavelets Multiresolution Inf. Process.}, volume = {18}, number = {5}, pages = {2050042:1--2050042:30}, year = {2020}, url = {https://doi.org/10.1142/S0219691320500423}, doi = {10.1142/S0219691320500423}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmip/KrishnanJR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaLO20, author = {Yunling Ma and Chengqing Li and Bo Ou}, title = {Cryptanalysis of an image block encryption algorithm based on chaotic maps}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102566}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102566}, doi = {10.1016/J.JISA.2020.102566}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MaLO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/GuptaSK20, author = {Anvita Gupta and Dilbag Singh and Manjit Kaur}, title = {An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {11}, number = {3}, pages = {1309--1324}, year = {2020}, url = {https://doi.org/10.1007/s12652-019-01493-x}, doi = {10.1007/S12652-019-01493-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/GuptaSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/ChenYYLMW20, author = {Liping Chen and Hao Yin and Liguo Yuan and Ant{\'{o}}nio M. Lopes and J. A. Tenreiro Machado and Ranchao Wu}, title = {A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and {DNA} sequence operations}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {21}, number = {6}, pages = {866--879}, year = {2020}, url = {https://doi.org/10.1631/FITEE.1900709}, doi = {10.1631/FITEE.1900709}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/ChenYYLMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/MadaniT20, author = {Mahdi Madani and Camel Tanougast}, title = {{FPGA} implementation of an optimized {A5/3} encryption algorithm}, journal = {Microprocess. Microsystems}, volume = {78}, pages = {103212}, year = {2020}, url = {https://doi.org/10.1016/j.micpro.2020.103212}, doi = {10.1016/J.MICPRO.2020.103212}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/MadaniT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HarissNS20, author = {Khalil Hariss and Hassan Noura and Abed Ellatif Samhat}, title = {An efficient fully homomorphic symmetric encryption algorithm}, journal = {Multim. Tools Appl.}, volume = {79}, number = {17-18}, pages = {12139--12164}, year = {2020}, url = {https://doi.org/10.1007/s11042-019-08511-2}, doi = {10.1007/S11042-019-08511-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HarissNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MalikGD20, author = {Anjali Malik and Shailender Gupta and Sangeeta Dhal}, title = {Analysis of traditional and modern image encryption algorithms under realistic ambience}, journal = {Multim. Tools Appl.}, volume = {79}, number = {37-38}, pages = {27941--27993}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-09279-6}, doi = {10.1007/S11042-020-09279-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/MalikGD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhengLZ20, author = {Jiming Zheng and Zheng Luo and Qingxia Zeng}, title = {An efficient image encryption algorithm based on multi chaotic system and random {DAN} coding}, journal = {Multim. Tools Appl.}, volume = {79}, number = {39-40}, pages = {29901--29921}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-09454-9}, doi = {10.1007/S11042-020-09454-9}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhengLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhuGLC20, author = {Changjiang Zhu and Zhihua Gan and Yang Lu and Xiuli Chai}, title = {An image encryption algorithm based on 3-D {DNA} level permutation and substitution scheme}, journal = {Multim. Tools Appl.}, volume = {79}, number = {11-12}, pages = {7227--7258}, year = {2020}, url = {https://doi.org/10.1007/s11042-019-08226-4}, doi = {10.1007/S11042-019-08226-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhuGLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/ChenSH20, author = {Chen Chen and Kehui Sun and Shaobo He}, title = {An improved image encryption algorithm with finite computing precision}, journal = {Signal Process.}, volume = {168}, year = {2020}, url = {https://doi.org/10.1016/j.sigpro.2019.107340}, doi = {10.1016/J.SIGPRO.2019.107340}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/ChenSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sis/KhanHSISI20, author = {Abdul Hannan Khan and Syed Anwer Hasnain and Shahan Yamin Siddiqui and Muhammad Sohail Irshad and Muhammad Sajid and Shahid Iqbal}, title = {Analytical Method to Compute the Cloud Computing Data Security Issues by Using Encryption Algorithms}, journal = {{EAI} Endorsed Trans. Scalable Inf. Syst.}, volume = {7}, number = {28}, pages = {e3}, year = {2020}, url = {https://doi.org/10.4108/eai.13-7-2018.164555}, doi = {10.4108/EAI.13-7-2018.164555}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sis/KhanHSISI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LiWWLZL20, author = {Zhaohui Li and Yiqing Wang and Zhi Wang and Zheli Liu and Jian Zhang and Min Li}, title = {Reversible Information Hiding Algorithm Based on Multikey Encryption}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {8847559:1--8847559:10}, year = {2020}, url = {https://doi.org/10.1155/2020/8847559}, doi = {10.1155/2020/8847559}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/LiWWLZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/GeethaPTL20, author = {R. Geetha and T. Padmavathy and T. Thilagam and A. Lallithasree}, title = {Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm}, journal = {Wirel. Pers. Commun.}, volume = {112}, number = {1}, pages = {21--36}, year = {2020}, url = {https://doi.org/10.1007/s11277-019-07013-6}, doi = {10.1007/S11277-019-07013-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/GeethaPTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/AlipourPBAH20, author = {Amir Alipour and Athanasios Papadimitriou and Vincent Beroulle and Ehsan Aerabi and David H{\'{e}}ly}, title = {On the Performance of Non-Profiled Differential Deep Learning Attacks against an {AES} Encryption Algorithm Protected using a Correlated Noise Generation based Hiding Countermeasure}, booktitle = {2020 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020}, pages = {614--617}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/DATE48585.2020.9116387}, doi = {10.23919/DATE48585.2020.9116387}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/AlipourPBAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewdts/SafaryanRCPLA20, author = {Olga A. Safaryan and Evgenia V. Roshchina and Larissa V. Cherckesova and Elena V. Pinevich and Andrey G. Lobodenko and Boris A. Akishin}, title = {Cryptographic Algorithm Implementation for Data Encryption in {DBMS} {MS} {SQL} Server}, booktitle = {{IEEE} East-West Design {\&} Test Symposium, {EWDTS} 2020, Varna, Bulgaria, September 4-7, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EWDTS50664.2020.9224775}, doi = {10.1109/EWDTS50664.2020.9224775}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ewdts/SafaryanRCPLA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangYTHZ20, author = {Danghui Wang and Chen Yue and Ze Tian and Ru Han and Lu Zhang}, editor = {Meikang Qiu}, title = {An Energy-Efficient {AES} Encryption Algorithm Based on Memristor Switch}, booktitle = {Algorithms and Architectures for Parallel Processing - 20th International Conference, {ICA3PP} 2020, New York City, NY, USA, October 2-4, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12454}, pages = {639--653}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60248-2\_44}, doi = {10.1007/978-3-030-60248-2\_44}, timestamp = {Thu, 01 Oct 2020 14:14:33 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangYTHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbet/YumangDLML20, author = {Analyn Niere Yumang and Ericson D. Dimaunahan and Jose B. Lazaro and Joshua Luis T. Marinas and John Emmanuel G. Logatoc}, title = {Encryption and Decryption of Vital Signs Information through a Symmetric based Cryptography Algorithm}, booktitle = {Proceedings of the 10th International Conference on Biomedical Engineering and Technology, {ICBET} 2020, Tokyo, Japan, September 15-18, 2020}, pages = {218--223}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3397391.3397423}, doi = {10.1145/3397391.3397423}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbet/YumangDLML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/AvK20, author = {Nandini Av and Nilita Anil Kumar}, title = {Image Encryption Using Genetic Algorithm and Bit-Slice Rotation}, booktitle = {11th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCCNT49239.2020.9225312}, doi = {10.1109/ICCCNT49239.2020.9225312}, timestamp = {Thu, 22 Oct 2020 13:44:41 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/AvK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/BhamidipatiA20, author = {Kishore Bhamidipati and Soorya Annadurai}, editor = {Brij B. Gupta and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Dharma P. Agrawal and Deepak Gupta}, title = {Permutation-Substitution Based Image Encryption Algorithms Using Pseudorandom Number Generators}, booktitle = {Handbook of Computer Networks and Cyber Security, Principles and Paradigms}, pages = {825--848}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-22277-2\_33}, doi = {10.1007/978-3-030-22277-2\_33}, timestamp = {Sun, 12 Nov 2023 02:22:31 +0100}, biburl = {https://dblp.org/rec/books/sp/20/BhamidipatiA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-12264, author = {Iqtadar Hussain and Amir Anees and Temadher Alassiry Al{-}Maadeed and M. T. Mustafa}, title = {A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group}, journal = {CoRR}, volume = {abs/2004.12264}, year = {2020}, url = {https://arxiv.org/abs/2004.12264}, eprinttype = {arXiv}, eprint = {2004.12264}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-12264.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-11847, author = {Temadher Alassiry Al{-}Maadeed and Iqtadar Hussain and Amir Anees and M. T. Mustafa}, title = {An image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes}, journal = {CoRR}, volume = {abs/2006.11847}, year = {2020}, url = {https://arxiv.org/abs/2006.11847}, eprinttype = {arXiv}, eprint = {2006.11847}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-11847.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-00575, author = {Unnikrishnan Menon and Anirudh Rajiv Menon and Atharva Hudlikar}, title = {A Novel Chaotic System for Text Encryption Optimized with Genetic Algorithm}, journal = {CoRR}, volume = {abs/2011.00575}, year = {2020}, url = {https://arxiv.org/abs/2011.00575}, eprinttype = {arXiv}, eprint = {2011.00575}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-00575.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ManLDB19, author = {Zhenlong Man and Jinqing Li and Xiaoqiang Di and Ou Bai}, title = {An Image Segmentation Encryption Algorithm Based on Hybrid Chaotic System}, journal = {{IEEE} Access}, volume = {7}, pages = {103047--103058}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2931732}, doi = {10.1109/ACCESS.2019.2931732}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ManLDB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZ19g, author = {Xingyuan Wang and Hongyu Zhao}, title = {Cracking and Improvement of an Image Encryption Algorithm Based on Bit-Level Permutation and Chaotic System}, journal = {{IEEE} Access}, volume = {7}, pages = {112836--112847}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2935017}, doi = {10.1109/ACCESS.2019.2935017}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangZ19g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csjm/MoldovyanMM19, author = {Alexander A. Moldovyan and Dmitriy N. Moldovyan and Nikolay A. Moldovyan}, title = {Post-quantum commutative encryption algorithm}, journal = {Comput. Sci. J. Moldova}, volume = {27}, number = {3}, pages = {299--317}, year = {2019}, url = {http://www.math.md/publications/csjm/issues/v27-n3/13004/}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csjm/MoldovyanMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/AskarKAA19, author = {Sameh S. Askar and Abdelrahman A. Karawia and Abdulrahman Al{-}Khedhairi and Fatemah S. Al{-}Ammar}, title = {An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps}, journal = {Entropy}, volume = {21}, number = {1}, pages = {44}, year = {2019}, url = {https://doi.org/10.3390/e21010044}, doi = {10.3390/E21010044}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/AskarKAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/KhanHMBU19, author = {Sajid Khan and Lansheng Han and Ghulam Mudassir and Guehguih Bachira and Hidayat Ullah}, title = {3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and {SM-DNA}}, journal = {Entropy}, volume = {21}, number = {11}, pages = {1075}, year = {2019}, url = {https://doi.org/10.3390/e21111075}, doi = {10.3390/E21111075}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/KhanHMBU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/WenYL19, author = {Heping Wen and Simin Yu and Jinhu L{\"{u}}}, title = {Breaking an Image Encryption Algorithm Based on {DNA} Encoding and Spatiotemporal Chaos}, journal = {Entropy}, volume = {21}, number = {3}, pages = {246}, year = {2019}, url = {https://doi.org/10.3390/e21030246}, doi = {10.3390/E21030246}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/WenYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/AnL19, author = {Feng{-}Ping An and Jun{-}e Liu}, title = {Image Encryption Algorithm Based on Adaptive Wavelet Chaos}, journal = {J. Sensors}, volume = {2019}, pages = {2768121:1--2768121:12}, year = {2019}, url = {https://doi.org/10.1155/2019/2768121}, doi = {10.1155/2019/2768121}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/AnL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/NkandeuT19, author = {Yannick Pascal Kamdeu Nkandeu and Alain Tiedeu}, title = {An image encryption algorithm based on substitution technique and chaos mixing}, journal = {Multim. Tools Appl.}, volume = {78}, number = {8}, pages = {10013--10034}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6612-2}, doi = {10.1007/S11042-018-6612-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/NkandeuT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhangH19, author = {Jian Zhang and Da Huo}, title = {Image encryption algorithm based on quantum chaotic map and {DNA} coding}, journal = {Multim. Tools Appl.}, volume = {78}, number = {11}, pages = {15605--15621}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6973-6}, doi = {10.1007/S11042-018-6973-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhangH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/GhadirliNE19, author = {Hossein Movafegh Ghadirli and Ali Nodehi and Rasul Enayatifar}, title = {An overview of encryption algorithms in color images}, journal = {Signal Process.}, volume = {164}, pages = {163--185}, year = {2019}, url = {https://doi.org/10.1016/j.sigpro.2019.06.010}, doi = {10.1016/J.SIGPRO.2019.06.010}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/GhadirliNE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tds/HerbadjiDBHB19, author = {Djamel Herbadji and Nadir Derouiche and A{\"{\i}}ssa Belmeguena{\"{\i}} and Abderrahmane Herbadji and Selma Boumerdassi}, title = {A Tweakable Image Encryption Algorithm Using an Improved Logistic Chaotic Map}, journal = {Traitement du Signal}, volume = {36}, number = {5}, pages = {407--417}, year = {2019}, url = {https://doi.org/10.18280/ts.360505}, doi = {10.18280/TS.360505}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tds/HerbadjiDBHB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ArabRG19, author = {Alireza Arab and Mohammad Javad Rostami and Behnam Ghavami}, title = {An image encryption method based on chaos system and {AES} algorithm}, journal = {J. Supercomput.}, volume = {75}, number = {10}, pages = {6663--6682}, year = {2019}, url = {https://doi.org/10.1007/s11227-019-02878-7}, doi = {10.1007/S11227-019-02878-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ArabRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aces/MurtazaPHX019, author = {Abid Murtaza and Syed Jahanzeb Hussain Pirzada and Muhammad Noman Hasan and Tongge Xu and Jianwei Liu}, editor = {Mohammed Anbar and Nibras Abdullah and Selvakumar Manickam}, title = {An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication}, booktitle = {Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1132}, pages = {289--302}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-2693-0\_21}, doi = {10.1007/978-981-15-2693-0\_21}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aces/MurtazaPHX019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccoms/VibarMS19, author = {Jayvee Christopher N. Vibar and Ruji P. Medina and Ariel M. Sison}, title = {ERC5a - An Enhanced {RC5} Algorithm on Bit Propagation in the Encryption Function}, booktitle = {{IEEE} 4th International Conference on Computer and Communication Systems, {ICCCS} 2019, Singapore, February 23-25, 2019}, pages = {479--482}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCOMS.2019.8821685}, doi = {10.1109/CCOMS.2019.8821685}, timestamp = {Sun, 08 Aug 2021 01:40:50 +0200}, biburl = {https://dblp.org/rec/conf/ccoms/VibarMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csps/WangLMZ19, author = {Yingli Wang and Haiting Liu and Hongbin Ma and Wei Zhuang}, editor = {Qilian Liang and Wei Wang and Xin Liu and Zhenyu Na and Min Jia and Baoju Zhang}, title = {An Improved Adversarial Neural Network Encryption Algorithm Against the Chosen-Cipher Text Attack {(CCA)}}, booktitle = {Communications, Signal Processing, and Systems - Proceedings of the 8th International Conference on Communications, Signal Processing, and Systems, {CSPS} 2019, Urumqi, China, 20-22 July 2019}, series = {Lecture Notes in Electrical Engineering}, volume = {571}, pages = {1336--1343}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-9409-6\_160}, doi = {10.1007/978-981-13-9409-6\_160}, timestamp = {Thu, 09 Apr 2020 10:53:46 +0200}, biburl = {https://dblp.org/rec/conf/csps/WangLMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcsmart/KovalchukISPLK19, author = {Anatoliy Kovalchuk and Ivan Izonin and Christine Strauss and Mariia Podavalkina and Natalia Lotoshynska and Nataliya Kustra}, editor = {Natalia Kryvinska and Ivan Izonin and Michal Gregus and Aneta Poniszewska{-}Maranda and Ivanna Dronyuk}, title = {Image Encryption and Decryption Schemes Using Linear and Quadratic Fractal Algorithms and Their Systems}, booktitle = {Proceedings of the 1st International Workshop on Digital Content {\&} Smart Multimedia (DCSMart 2019), Lviv, Ukraine, December 23-25, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2533}, pages = {139--150}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2533/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:41 +0100}, biburl = {https://dblp.org/rec/conf/dcsmart/KovalchukISPLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/ChenFZK19, author = {Huili Chen and Cheng Fu and Jishen Zhao and Farinaz Koushanfar}, editor = {David Z. Pan}, title = {GenUnlock: An Automated Genetic Algorithm Framework for Unlocking Logic Encryption}, booktitle = {Proceedings of the International Conference on Computer-Aided Design, {ICCAD} 2019, Westminster, CO, USA, November 4-7, 2019}, pages = {1--8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1109/ICCAD45719.2019.8942134}, doi = {10.1109/ICCAD45719.2019.8942134}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccad/ChenFZK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccasa/MoldovyanMP019, author = {Dmitriy N. Moldovyan and Alexander A. Moldovyan and Ngoc Han Phieu and Minh Hieu Nguyen}, editor = {Phan Cong Vinh and Abdur Rakib}, title = {Post-quantum Commutative Encryption Algorithm}, booktitle = {Context-Aware Systems and Applications, and Nature of Computation and Communication - 8th {EAI} International Conference, {ICCASA} 2019, and 5th {EAI} International Conference, {ICTCC} 2019, My Tho City, Vietnam, November 28-29, 2019, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {298}, pages = {205--214}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34365-1\_16}, doi = {10.1007/978-3-030-34365-1\_16}, timestamp = {Thu, 02 Feb 2023 17:25:52 +0100}, biburl = {https://dblp.org/rec/conf/iccasa/MoldovyanMP019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/AkandeAAKAO19, author = {Noah Oluwatobi Akande and Christiana Oluwakemi Abikoye and Marion Olubunmi Adebiyi and Anthonia Aderonke Kayode and Adekanmi Adeyinka Adegun and Roseline Oluwaseun Ogundokun}, editor = {Sanjay Misra and Osvaldo Gervasi and Beniamino Murgante and Elena N. Stankova and Vladimir Korkhov and Carmelo Maria Torre and Ana Maria A. C. Rocha and David Taniar and Bernady O. Apduhan and Eufemia Tarantino}, title = {Electronic Medical Information Encryption Using Modified Blowfish Algorithm}, booktitle = {Computational Science and Its Applications - {ICCSA} 2019 - 19th International Conference, Saint Petersburg, Russia, July 1-4, 2019, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {11623}, pages = {166--179}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24308-1\_14}, doi = {10.1007/978-3-030-24308-1\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/AkandeAAKAO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/MatsunagaY19, author = {Yusuke Matsunaga and Masayoshi Yoshimura}, editor = {Dimitris Gizopoulos and Dan Alexandrescu and Panagiota Papavramidou and Michail Maniatakos}, title = {An Efficient SAT-Attack Algorithm Against Logic Encryption}, booktitle = {25th {IEEE} International Symposium on On-Line Testing and Robust System Design, {IOLTS} 2019, Rhodes, Greece, July 1-3, 2019}, pages = {44--47}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IOLTS.2019.8854466}, doi = {10.1109/IOLTS.2019.8854466}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/iolts/MatsunagaY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itnac/LiMA19, author = {Xue Jun Li and Maode Ma and Narayanan Arjun}, title = {An Encryption Algorithm to Prevent Domain Name System Cache Poisoning Attacks}, booktitle = {29th International Telecommunication Networks and Applications Conference, {ITNAC} 2019, Auckland, New Zealand, November 27-29, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ITNAC46935.2019.9078019}, doi = {10.1109/ITNAC46935.2019.9078019}, timestamp = {Mon, 04 May 2020 16:58:48 +0200}, biburl = {https://dblp.org/rec/conf/itnac/LiMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sips/TanAAAL19, author = {Weihang Tan and Aengran Au and Benjamin Aase and Shuhong Aao and Yingjie Lao}, title = {An Efficient Polynomial Multiplier Architecture for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme}, booktitle = {2019 {IEEE} International Workshop on Signal Processing Systems, SiPS 2019, Nanjing, China, October 20-23, 2019}, pages = {85--90}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SiPS47522.2019.9020592}, doi = {10.1109/SIPS47522.2019.9020592}, timestamp = {Thu, 12 Mar 2020 18:11:04 +0100}, biburl = {https://dblp.org/rec/conf/sips/TanAAAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-12915, author = {Yunling Ma and Chengqing Li}, title = {Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps}, journal = {CoRR}, volume = {abs/1912.12915}, year = {2019}, url = {http://arxiv.org/abs/1912.12915}, eprinttype = {arXiv}, eprint = {1912.12915}, timestamp = {Sat, 04 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-12915.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kaminsky19a, author = {Alan Kaminsky}, title = {Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2019}, url = {https://eprint.iacr.org/2019/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kaminsky19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZZ18, author = {Xingyuan Wang and Xiaoqiang Zhu and Yingqian Zhang}, title = {An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map}, journal = {{IEEE} Access}, volume = {6}, pages = {23733--23746}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2805847}, doi = {10.1109/ACCESS.2018.2805847}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/WangSPRWJLWWCJ18, author = {Wei Wang and Miaomiao Si and Yu Pang and Peng Ran and Huiqian Wang and Xiaoming Jiang and Yu Liu and Jun Wu and Wei Wu and Naveen K. Chilamkurti and Gwanggil Jeon}, title = {An encryption algorithm based on combined chaos in body area networks}, journal = {Comput. Electr. Eng.}, volume = {65}, pages = {282--291}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2017.07.026}, doi = {10.1016/J.COMPELECENG.2017.07.026}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/WangSPRWJLWWCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ChandrasekaranB18, author = {Balaji Chandrasekaran and Ramadoss Balakrishnan}, title = {An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {14}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030014}, doi = {10.3390/CRYPTOGRAPHY2030014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ChandrasekaranB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/HuangY18, author = {Xiaoling Huang and Guodong Ye}, title = {An Image Encryption Algorithm Based on Time-Delay and Random Insertion}, journal = {Entropy}, volume = {20}, number = {12}, pages = {974}, year = {2018}, url = {https://doi.org/10.3390/e20120974}, doi = {10.3390/E20120974}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/HuangY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/LiLLH18, author = {Chengqing Li and Dongdong Lin and Jinhu Lu and Feng Hao}, title = {Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography}, journal = {{IEEE} Multim.}, volume = {25}, number = {4}, pages = {46--56}, year = {2018}, url = {https://doi.org/10.1109/MMUL.2018.2873472}, doi = {10.1109/MMUL.2018.2873472}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeemm/LiLLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcvr/ReddyRB18, author = {M. Purushotham Reddy and B. Venkata Ramana Reddy and Shoba Bindu Chigarepalli}, title = {An image encryption algorithm using logarithmic function and Henon-chaotic function}, journal = {Int. J. Comput. Vis. Robotics}, volume = {8}, number = {4}, pages = {388--402}, year = {2018}, url = {https://doi.org/10.1504/IJCVR.2018.093969}, doi = {10.1504/IJCVR.2018.093969}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcvr/ReddyRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/Vargas-Vera18, author = {Maria Vargas{-}Vera}, title = {Tu-vera: An Encryption Algorithm Using Propositional Logic Calculus}, journal = {Int. J. Smart Educ. Urban Soc.}, volume = {9}, number = {2}, pages = {49--59}, year = {2018}, url = {https://doi.org/10.4018/IJSEUS.2018040105}, doi = {10.4018/IJSEUS.2018040105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijksr/Vargas-Vera18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/AhmadAALA18, author = {Musheer Ahmad and Mohammad Zaiyan Alam and Subia Ansari and Dragan Lambic and Hamed D. Al{-}Sharari}, title = {Cryptanalysis of an image encryption algorithm based on {PWLCM} and inertial delayed neural network}, journal = {J. Intell. Fuzzy Syst.}, volume = {34}, number = {3}, pages = {1323--1332}, year = {2018}, url = {https://doi.org/10.3233/JIFS-169428}, doi = {10.3233/JIFS-169428}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/AhmadAALA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/MelloX18, author = {Fl{\'{a}}vio Luis de Mello and Jos{\'{e}} A. M. Xex{\'{e}}o}, title = {Identifying Encryption Algorithms in {ECB} and {CBC} Modes Using Computational Intelligence}, journal = {J. Univers. Comput. Sci.}, volume = {24}, number = {1}, pages = {25--42}, year = {2018}, url = {http://www.jucs.org/jucs\_24\_1/identifying\_encryption\_algorithms\_in}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/MelloX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuangY18, author = {Xiaoling Huang and Guodong Ye}, title = {An image encryption algorithm based on irregular wave representation}, journal = {Multim. Tools Appl.}, volume = {77}, number = {2}, pages = {2611--2628}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4455-x}, doi = {10.1007/S11042-017-4455-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HuangY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuYZC18, author = {Jingyi Liu and Dingding Yang and Hongbo Zhou and Shiqiang Chen}, title = {A digital image encryption algorithm based on bit-planes and an improved logistic map}, journal = {Multim. Tools Appl.}, volume = {77}, number = {8}, pages = {10217--10233}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-5406-2}, doi = {10.1007/S11042-017-5406-2}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuYZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LuoZLQC18, author = {Yuling Luo and Ronglong Zhou and Junxiu Liu and Senhui Qiu and Yi Cao}, title = {An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers}, journal = {Multim. Tools Appl.}, volume = {77}, number = {20}, pages = {26191--26217}, year = {2018}, url = {https://doi.org/10.1007/s11042-018-5844-5}, doi = {10.1007/S11042-018-5844-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LuoZLQC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhuZ18, author = {Shuqin Zhu and Congxu Zhu}, title = {Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system}, journal = {Multim. Tools Appl.}, volume = {77}, number = {21}, pages = {29119--29142}, year = {2018}, url = {https://doi.org/10.1007/s11042-018-6078-2}, doi = {10.1007/S11042-018-6078-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhuZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Lara-NinoDM18, author = {Carlos Andres Lara{-}Nino and Arturo Diaz{-}Perez and Miguel Morales{-}Sandoval}, title = {Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in {WSN}}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {5087065:1--5087065:14}, year = {2018}, url = {https://doi.org/10.1155/2018/5087065}, doi = {10.1155/2018/5087065}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Lara-NinoDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/ChaiZGHC18, author = {Xiu{-}Li Chai and Xiaoyu Zheng and Zhihua Gan and Daojun Han and Yiran Chen}, title = {An image encryption algorithm based on chaotic system and compressive sensing}, journal = {Signal Process.}, volume = {148}, pages = {124--144}, year = {2018}, url = {https://doi.org/10.1016/j.sigpro.2018.02.007}, doi = {10.1016/J.SIGPRO.2018.02.007}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/ChaiZGHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/AhmadSWDBA18, author = {Musheer Ahmad and Eesa A. Alsolami and Xing{-}Yuan Wang and Mohammad Najam Doja and Mirza Mohd. Sufyan Beg and Amer Awad Alzaidi}, title = {Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a {BAN} System, and Improved Scheme Using {SHA-512} and Hyperchaos}, journal = {Symmetry}, volume = {10}, number = {7}, pages = {266}, year = {2018}, url = {https://doi.org/10.3390/sym10070266}, doi = {10.3390/SYM10070266}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/AhmadSWDBA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ZhuWS18, author = {Congxu Zhu and Guojun Wang and Kehui Sun}, title = {Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box}, journal = {Symmetry}, volume = {10}, number = {9}, pages = {399}, year = {2018}, url = {https://doi.org/10.3390/sym10090399}, doi = {10.3390/SYM10090399}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/ZhuWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/MiglioreRLTFG18, author = {Vincent Migliore and Maria Mendez Real and Vianney Lapotre and Arnaud Tisserand and Caroline Fontaine and Guy Gogniat}, title = {Hardware/Software Co-Design of an Accelerator for {FV} Homomorphic Encryption Scheme Using Karatsuba Algorithm}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {3}, pages = {335--347}, year = {2018}, url = {https://doi.org/10.1109/TC.2016.2645204}, doi = {10.1109/TC.2016.2645204}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/MiglioreRLTFG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bic-ta/CuiWZZ18, author = {Guangzhao Cui and Lingfei Wang and Xuncai Zhang and Zheng Zhou}, editor = {Jianyong Qiao and Xinchao Zhao and Linqiang Pan and Xingquan Zuo and Xingyi Zhang and Qingfu Zhang and Shanguo Huang}, title = {An Image Encryption Algorithm Based on Dynamic {DNA} Coding and Hyper-chaotic Lorenz System}, booktitle = {Bio-inspired Computing: Theories and Applications - 13th International Conference, {BIC-TA} 2018, Beijing, China, November 2-4, 2018, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {952}, pages = {226--238}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-2829-9\_21}, doi = {10.1007/978-981-13-2829-9\_21}, timestamp = {Tue, 26 Apr 2022 12:02:09 +0200}, biburl = {https://dblp.org/rec/conf/bic-ta/CuiWZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bic-ta/ZhangZNWW18, author = {Xuncai Zhang and Zheng Zhou and Ying Niu and Yanfeng Wang and Lingfei Wang}, editor = {Jianyong Qiao and Xinchao Zhao and Linqiang Pan and Xingquan Zuo and Xingyi Zhang and Qingfu Zhang and Shanguo Huang}, title = {An Image Encryption Algorithm Based on Chaotic System Using {DNA} Sequence Operations}, booktitle = {Bio-inspired Computing: Theories and Applications - 13th International Conference, {BIC-TA} 2018, Beijing, China, November 2-4, 2018, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {952}, pages = {213--225}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-2829-9\_20}, doi = {10.1007/978-981-13-2829-9\_20}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bic-ta/ZhangZNWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bic-ta/ZhangZZWL18, author = {Xuncai Zhang and Hangyu Zhou and Zheng Zhou and Lingfei Wang and Chao Li}, editor = {Jianyong Qiao and Xinchao Zhao and Linqiang Pan and Xingquan Zuo and Xingyi Zhang and Qingfu Zhang and Shanguo Huang}, title = {An Image Encryption Algorithm Based on Hyper-chaotic System and Genetic Algorithm}, booktitle = {Bio-inspired Computing: Theories and Applications - 13th International Conference, {BIC-TA} 2018, Beijing, China, November 2-4, 2018, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {952}, pages = {466--476}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-2829-9\_43}, doi = {10.1007/978-981-13-2829-9\_43}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bic-ta/ZhangZZWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsmp/KovalchukL18, author = {Anatoliy Kovalchuk and Nataliia Lotoshynska}, title = {Elements of {RSA} Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images}, booktitle = {Second International Conference on Data Stream Mining {\&} Processing, {DSMP} 2018, Lviv, Ukraine, August 21-25, 2018}, pages = {542--544}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSMP.2018.8478471}, doi = {10.1109/DSMP.2018.8478471}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsmp/KovalchukL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaip/YeHP18, author = {Guodong Ye and Xiaoling Huang and Chen Pan}, title = {An Efficient Image Encryption Algorithm Based on Three-dimensional Chaotic Map}, booktitle = {Proceedings of the 2nd International Conference on Advances in Image Processing, {ICAIP} 2018, Chengdu, China, June 16-18, 2018}, pages = {78--82}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3239576.3239584}, doi = {10.1145/3239576.3239584}, timestamp = {Thu, 23 Mar 2023 11:00:28 +0100}, biburl = {https://dblp.org/rec/conf/icaip/YeHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LuLXG18, author = {Bin Lu and Fenlin Liu and Ping Xu and Xin Ge}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {506--518}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_46}, doi = {10.1007/978-3-030-00012-7\_46}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LuLXG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isda/BanerjeeP18, author = {Soumi Banerjee and Anita Patil}, editor = {Ajith Abraham and Aswani Kumar Cherukuri and Patricia Melin and Niketa Gandhi}, title = {{ECC} Based Encryption Algorithm for Lightweight Cryptography}, booktitle = {Intelligent Systems Design and Applications - 18th International Conference on Intelligent Systems Design and Applications, {ISDA} 2018, Vellore, India, December 6-8, 2018, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {940}, pages = {600--609}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-16657-1\_56}, doi = {10.1007/978-3-030-16657-1\_56}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isda/BanerjeeP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-02891, author = {Jissy Ann George and S. Veni and Safeeullah Soomro}, title = {Improving Privacy and Trust in Federated Identity Using {SAML} with Hash Based Encryption Algorithm}, journal = {CoRR}, volume = {abs/1803.02891}, year = {2018}, url = {http://arxiv.org/abs/1803.02891}, eprinttype = {arXiv}, eprint = {1803.02891}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-02891.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-02647, author = {Osama A. S. Alkishriwo}, title = {An Image Encryption Algorithm Based on Chaotic Maps and Discrete Linear Chirp Transform}, journal = {CoRR}, volume = {abs/1807.02647}, year = {2018}, url = {http://arxiv.org/abs/1807.02647}, eprinttype = {arXiv}, eprint = {1807.02647}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-02647.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-03692, author = {Xiaowei Li and Ying Wang and Qiong{-}Hua Wang and Yang Liu and Xin Zhou}, title = {Modified integral imaging reconstruction and encryption using an improved {SR} reconstruction algorithm}, journal = {CoRR}, volume = {abs/1809.03692}, year = {2018}, url = {http://arxiv.org/abs/1809.03692}, eprinttype = {arXiv}, eprint = {1809.03692}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-03692.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YuWXGAZY17, author = {Ruiguo Yu and Jianrong Wang and Tianyi Xu and Jie Gao and Yongli An and Gong Zhang and Mei Yu}, title = {Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network}, journal = {{IEEE} Access}, volume = {5}, pages = {24944--24951}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2767285}, doi = {10.1109/ACCESS.2017.2767285}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YuWXGAZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/LiLL17, author = {Chengqing Li and Dongdong Lin and Jinhu Lu}, title = {Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits}, journal = {{IEEE} Multim.}, volume = {24}, number = {3}, pages = {64--71}, year = {2017}, url = {https://doi.org/10.1109/MMUL.2017.3051512}, doi = {10.1109/MMUL.2017.3051512}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeemm/LiLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbidm/PriyaSJ17, author = {P. Shanmuga Priya and Rajendran Sugumar and Sasidevi Jayaraman}, title = {An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data}, journal = {Int. J. Bus. Intell. Data Min.}, volume = {12}, number = {1}, pages = {44--61}, year = {2017}, url = {https://doi.org/10.1504/IJBIDM.2017.10002867}, doi = {10.1504/IJBIDM.2017.10002867}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbidm/PriyaSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AmiruddinRS17, author = {Amiruddin Amiruddin and Anak Agung Putri Ratna and Riri Fitri Sari}, title = {New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {9}, number = {3}, year = {2017}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2307}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AmiruddinRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/YeH17, author = {Guodong Ye and Xiaoling Huang}, title = {An efficient symmetric image encryption algorithm based on an intertwining logistic map}, journal = {Neurocomputing}, volume = {251}, pages = {45--53}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2017.04.016}, doi = {10.1016/J.NEUCOM.2017.04.016}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/YeH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaLT/KhanKAHA17, author = {Jan Sher Khan and Muazzam Ali Khan and Jawad Ahmad and Seong Oun Hwang and Waqas Ahmed}, title = {An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes}, journal = {Informatica}, volume = {28}, number = {4}, pages = {629--649}, year = {2017}, url = {https://content.iospress.com/articles/informatica/inf1160}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informaticaLT/KhanKAHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangW017, author = {Xiao Zhang and Chengqi Wang and Zhiming Zheng}, title = {An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {3}, pages = {1785--1801}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.03.029}, doi = {10.3837/TIIS.2017.03.029}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ZhangW017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/Murillo-Escobar17, author = {Miguel {\'{A}}ngel Murillo{-}Escobar and Liliana Cardoza{-}Avenda{\~{n}}o and Rosa Martha L{\'{o}}pez{-}Guti{\'{e}}rrez and C{\'{e}}sar Cruz{-}Hern{\'{a}}ndez}, title = {A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine}, journal = {J. Medical Syst.}, volume = {41}, number = {4}, pages = {59:1--59:17}, year = {2017}, url = {https://doi.org/10.1007/s10916-017-0698-3}, doi = {10.1007/S10916-017-0698-3}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/Murillo-Escobar17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/Chai17, author = {Xiu{-}Li Chai}, title = {An image encryption algorithm based on bit level Brownian motion and new chaotic systems}, journal = {Multim. Tools Appl.}, volume = {76}, number = {1}, pages = {1159--1175}, year = {2017}, url = {https://doi.org/10.1007/s11042-015-3088-1}, doi = {10.1007/S11042-015-3088-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/Chai17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuM17, author = {Lingfeng Liu and Suoxia Miao}, title = {An image encryption algorithm based on Baker map with varying parameter}, journal = {Multim. Tools Appl.}, volume = {76}, number = {15}, pages = {16511--16527}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3925-x}, doi = {10.1007/S11042-016-3925-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/NorouziM17a, author = {Benyamin Norouzi and Sattar Mirzakuchaki}, title = {An image encryption algorithm based on {DNA} sequence operations and cellular neural network}, journal = {Multim. Tools Appl.}, volume = {76}, number = {11}, pages = {13681--13701}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3769-4}, doi = {10.1007/S11042-016-3769-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/NorouziM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ThanhT17, author = {Ta Minh Thanh and Keisuke Tanaka}, title = {An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information}, journal = {Multim. Tools Appl.}, volume = {76}, number = {11}, pages = {13455--13471}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3750-2}, doi = {10.1007/S11042-016-3750-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ThanhT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WangZZ17, author = {Chengqi Wang and Xiao Zhang and Zhiming Zheng}, title = {An efficient image encryption algorithm based on a novel chaotic map}, journal = {Multim. Tools Appl.}, volume = {76}, number = {22}, pages = {24251--24280}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-4102-y}, doi = {10.1007/S11042-016-4102-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WangZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhangNMT17, author = {Xuanping Zhang and Weiguo Nie and Youling Ma and Qinqin Tian}, title = {Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box}, journal = {Multim. Tools Appl.}, volume = {76}, number = {14}, pages = {15641--15659}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3861-9}, doi = {10.1007/S11042-016-3861-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhangNMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/ChaiGYCL17, author = {Xiu{-}Li Chai and Zhihua Gan and Kang Yang and Yiran Chen and Xianxing Liu}, title = {An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and {DNA} sequence operations}, journal = {Signal Process. Image Commun.}, volume = {52}, pages = {6--19}, year = {2017}, url = {https://doi.org/10.1016/j.image.2016.12.007}, doi = {10.1016/J.IMAGE.2016.12.007}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spic/ChaiGYCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/AryalIHK17, author = {Anu Aryal and Shoko Imaizumi and Takahiko Horiuchi and Hitoshi Kiya}, title = {Integrated algorithm for block-permutation-based encryption with reversible data hiding}, booktitle = {2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2017, Kuala Lumpur, Malaysia, December 12-15, 2017}, pages = {203--208}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/APSIPA.2017.8282028}, doi = {10.1109/APSIPA.2017.8282028}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apsipa/AryalIHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/DiWLCQZ17, author = {Xiaoqiang Di and Yingzheng Wang and Jinqing Li and Ligang Cong and Hui Qi and Yuxin Zhang}, editor = {Qingli Li and Lipo Wang and Mei Zhou and Li Sun and Song Qiu and Hongying Liu}, title = {An optimized video selective encryption algorithm}, booktitle = {10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, {CISP-BMEI} 2017, Shanghai, China, October 14-16, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CISP-BMEI.2017.8301932}, doi = {10.1109/CISP-BMEI.2017.8301932}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/bmei/DiWLCQZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/SunLL17, author = {Chao Sun and Li Li and Yuqi Liu}, editor = {Jeng{-}Shyang Pan and Pei{-}Wei Tsai and Junzo Watada and Lakhmi C. Jain}, title = {An Encryption Algorithm for {ROI} Images}, booktitle = {Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2017, August, 12-15, 2017, Matsue, Shimane, Japan, Part {I}}, series = {Smart Innovation, Systems and Technologies}, volume = {81}, pages = {440--448}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63856-0\_53}, doi = {10.1007/978-3-319-63856-0\_53}, timestamp = {Sun, 25 Oct 2020 22:36:27 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/SunLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-01858, author = {Chengqing Li and Dongdong Lin}, title = {Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography}, journal = {CoRR}, volume = {abs/1711.01858}, year = {2017}, url = {http://arxiv.org/abs/1711.01858}, eprinttype = {arXiv}, eprint = {1711.01858}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-01858.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csjm/MoldovyanMMS16, author = {Nikolay A. Moldovyan and Alexander A. Moldovyan and Dmitriy N. Moldovyan and Victor A. Shcherbacov}, title = {Stream Deniable-Encryption Algorithms}, journal = {Comput. Sci. J. Moldova}, volume = {24}, number = {1}, pages = {68--82}, year = {2016}, url = {http://www.math.md/publications/csjm/issues/v24-n1/12094/}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csjm/MoldovyanMMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/Anghelescu16, author = {Petre Anghelescu}, title = {{FPGA} implementation of programmable cellular automata encryption algorithm for network communications}, journal = {Comput. Syst. Sci. Eng.}, volume = {31}, number = {5}, year = {2016}, timestamp = {Fri, 17 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/Anghelescu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/YeH16, author = {Guodong Ye and Xiaoling Huang}, title = {An Image Encryption Algorithm Based on Autoblocking and Electrocardiography}, journal = {{IEEE} Multim.}, volume = {23}, number = {2}, pages = {64--71}, year = {2016}, url = {https://doi.org/10.1109/MMUL.2015.72}, doi = {10.1109/MMUL.2015.72}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeemm/YeH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/GeLLG16, author = {Xin Ge and Bin Lu and Fenlin Liu and Daofu Gong}, title = {An Image Encryption Algorithm Based on Information Hiding}, journal = {Int. J. Bifurc. Chaos}, volume = {26}, number = {11}, pages = {1650192:1--1650192:14}, year = {2016}, url = {https://doi.org/10.1142/S0218127416501923}, doi = {10.1142/S0218127416501923}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/GeLLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmip/KumarJ16, author = {Manish Kumar and Kashyap L. S. J. Josyula}, title = {An interlaced secure algorithm for {RGB} image encryption in wavelet packet domain}, journal = {Int. J. Wavelets Multiresolution Inf. Process.}, volume = {14}, number = {3}, pages = {1650008:1--1650008:14}, year = {2016}, url = {https://doi.org/10.1142/S0219691316500089}, doi = {10.1142/S0219691316500089}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmip/KumarJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/HouariT16, author = {Nawal Sad Houari and Noria Taghezout}, title = {A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm}, journal = {J. Inf. Process. Syst.}, volume = {12}, number = {4}, pages = {688--710}, year = {2016}, url = {https://doi.org/10.3745/JIPS.03.0056}, doi = {10.3745/JIPS.03.0056}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jips/HouariT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/Murillo-Escobar16, author = {Miguel {\'{A}}ngel Murillo{-}Escobar and C{\'{e}}sar Cruz{-}Hern{\'{a}}ndez and Fausto Abundiz{-}P{\'{e}}rez and Rosa Martha L{\'{o}}pez{-}Guti{\'{e}}rrez}, title = {Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller}, journal = {Microprocess. Microsystems}, volume = {45}, pages = {297--309}, year = {2016}, url = {https://doi.org/10.1016/j.micpro.2016.06.004}, doi = {10.1016/J.MICPRO.2016.06.004}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/Murillo-Escobar16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/JainR16, author = {Anchal Jain and Navin Rajpal}, title = {A robust image encryption algorithm resistant to attacks using {DNA} and chaotic logistic maps}, journal = {Multim. Tools Appl.}, volume = {75}, number = {10}, pages = {5455--5472}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2515-7}, doi = {10.1007/S11042-015-2515-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/JainR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZengLZLW16, author = {Li Zeng and Renren Liu and Leo Yu Zhang and Yuansheng Liu and Kwok{-}Wo Wong}, title = {Cryptanalyzing an image encryption algorithm based on scrambling and Vegin{\`{e}}re cipher}, journal = {Multim. Tools Appl.}, volume = {75}, number = {10}, pages = {5439--5453}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2511-y}, doi = {10.1007/S11042-015-2511-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZengLZLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/ChoiK16, author = {Jaehak Choi and Youngseop Kim}, title = {An improved {LEA} block encryption algorithm to prevent side-channel attack in the IoT system}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} 2016, Jeju, South Korea, December 13-16, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/APSIPA.2016.7820845}, doi = {10.1109/APSIPA.2016.7820845}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/apsipa/ChoiK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fedcsis/HousseinAH16, author = {Essam H. Houssein and Mona A. S. Ali and Aboul Ella Hassanien}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {An Image Steganography Algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System}, booktitle = {Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, FedCSIS 2016, Gda{\'{n}}sk, Poland, September 11-14, 2016}, series = {Annals of Computer Science and Information Systems}, volume = {8}, pages = {641--644}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.15439/2016F521}, doi = {10.15439/2016F521}, timestamp = {Tue, 23 Apr 2024 09:56:26 +0200}, biburl = {https://dblp.org/rec/conf/fedcsis/HousseinAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/NarayanasamyA16, author = {Kanagaraj Narayanasamy and Padmapriya Arumugam}, editor = {Nikolaj S. Bj{\o}rner and Sanjiva Prasad and Laxmi Parida}, title = {i-TSS: An Image Encryption Algorithm Based on Transposition, Shuffling and Substitution Using Randomly Generated Bitmap Image}, booktitle = {Distributed Computing and Internet Technology - 12th International Conference, {ICDCIT} 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9581}, pages = {148--156}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-28034-9\_20}, doi = {10.1007/978-3-319-28034-9\_20}, timestamp = {Thu, 14 Apr 2022 20:26:15 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/NarayanasamyA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/KumarA16, author = {A. D. Senthil Kumar and T. S. Anandhi}, title = {Multi image integration and Encryption Algorithm for security applications}, booktitle = {{IECON} 2016 - 42nd Annual Conference of the {IEEE} Industrial Electronics Society, Florence, Italy, October 23-26, 2016}, pages = {986--991}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IECON.2016.7793265}, doi = {10.1109/IECON.2016.7793265}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iecon/KumarA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipas2/NiniZO16, author = {Brahim Nini and Asma Zitouni and Asma Ounzar}, title = {Analysis of the use of some statistical measures in deciding about the efficiency of an image encryption algorithm}, booktitle = {International Image Processing, Applications and Systems, {IPAS} 2016, Hammamet, Tunisia, November 5-7, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IPAS.2016.7880130}, doi = {10.1109/IPAS.2016.7880130}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ipas2/NiniZO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiL16a, author = {Chengqing Li and Dongdong Lin}, title = {Cryptanalysis of an Image Scrambling Encryption Algorithm}, journal = {CoRR}, volume = {abs/1607.01642}, year = {2016}, url = {http://arxiv.org/abs/1607.01642}, eprinttype = {arXiv}, eprint = {1607.01642}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LiL16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SinghD16, author = {Kirat Pal Singh and Shiwani Dod}, title = {An Efficient Hardware design and Implementation of Advanced Encryption Standard {(AES)} Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {789}, year = {2016}, url = {http://eprint.iacr.org/2016/789}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SinghD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/Murillo-EscobarCALC15, author = {Miguel {\'{A}}ngel Murillo{-}Escobar and C{\'{e}}sar Cruz{-}Hern{\'{a}}ndez and Fausto Abundiz{-}P{\'{e}}rez and Rosa Martha L{\'{o}}pez{-}Guti{\'{e}}rrez and Oscar Ricardo Acosta del Campo}, title = {A {RGB} image encryption algorithm based on total plain image characteristics and chaos}, journal = {Signal Process.}, volume = {109}, pages = {119--131}, year = {2015}, url = {https://doi.org/10.1016/j.sigpro.2014.10.033}, doi = {10.1016/J.SIGPRO.2014.10.033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/Murillo-EscobarCALC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai2/Soloi15, author = {Anton Soloi}, title = {An encryption algorithm}, booktitle = {2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Bucharest, Romania, June 25-27, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ECAI.2015.7301252}, doi = {10.1109/ECAI.2015.7301252}, timestamp = {Fri, 08 Apr 2022 09:38:09 +0200}, biburl = {https://dblp.org/rec/conf/ecai2/Soloi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/Burak15, author = {Dariusz Burak}, editor = {Slawomir Koziel and Leifur {\TH}. Leifsson and Michael Lees and Valeria V. Krzhizhanovskaya and Jack J. Dongarra and Peter M. A. Sloot}, title = {Parallelization of an Encryption Algorithm Based on a Spatiotemporal Chaotic System and a Chaotic Neural Network}, booktitle = {Proceedings of the International Conference on Computational Science, {ICCS} 2015, Computational Science at the Gates of Nature, Reykjav{\'{\i}}k, Iceland, 1-3 June, 2015, 2014}, series = {Procedia Computer Science}, volume = {51}, pages = {2888--2892}, publisher = {Elsevier}, year = {2015}, url = {https://doi.org/10.1016/j.procs.2015.05.453}, doi = {10.1016/J.PROCS.2015.05.453}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/Burak15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncvpripg/SinghSR15, author = {Piyush Kumar Singh and Ravi Shankar Singh and Kabindra Nath Rai}, title = {An image encryption algorithm based on {XOR} operation with approximation component in wavelet transform}, booktitle = {2015 Fifth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG), Patna, India, December 16-19, 2015}, pages = {1--4}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NCVPRIPG.2015.7490013}, doi = {10.1109/NCVPRIPG.2015.7490013}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/ncvpripg/SinghSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rvsp/YangLYKHD15, author = {Zi{-}Heng Yang and Aohan Li and Ling{-}Ling Yu and Shi{-}Jun Kang and Meng{-}Jiang Han and Qun Ding}, title = {An Improved {AES} Encryption Algorithm Based on Chaos Theory in Wireless Communication Networks}, booktitle = {Third International Conference on Robot, Vision and Signal Processing, {RVSP} 2015, Kaohsiung, Taiwan, November 18-20, 2015}, pages = {159--162}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/RVSP.2015.45}, doi = {10.1109/RVSP.2015.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rvsp/YangLYKHD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siu/GuvenogluT15, author = {Erdal G{\"{u}}venoglu and Mehmet Ali Aksoy Tuysuz}, title = {An improvement for Knutt/Durstenfeld algorithm based image encryption}, booktitle = {2015 23nd Signal Processing and Communications Applications Conference (SIU), Malatya, Turkey, May 16-19, 2015}, pages = {1761--1764}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SIU.2015.7130194}, doi = {10.1109/SIU.2015.7130194}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/siu/GuvenogluT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChadhaMCJR15, author = {Aman Chadha and Sushmit Mallik and Ankit R. Chadha and Ravdeep Johar and M. Mani Roja}, title = {Dual-Layer Video Encryption using {RSA} Algorithm}, journal = {CoRR}, volume = {abs/1509.04387}, year = {2015}, url = {http://arxiv.org/abs/1509.04387}, eprinttype = {arXiv}, eprint = {1509.04387}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChadhaMCJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LalSK15, author = {Nidhi Lal and Anurag Prakash Singh and Shishupal Kumar}, title = {Modified Trial Division Algorithm Using KNJ-Factorization Method To Factorize {RSA} Public Key Encryption}, journal = {CoRR}, volume = {abs/1501.02365}, year = {2015}, url = {http://arxiv.org/abs/1501.02365}, eprinttype = {arXiv}, eprint = {1501.02365}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LalSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cnsns/AneesSA14, author = {Amir Anees and Adil Masood Siddiqui and Fawad Ahmed}, title = {Chaotic substitution for highly autocorrelated data in encryption algorithm}, journal = {Commun. Nonlinear Sci. Numer. Simul.}, volume = {19}, number = {9}, pages = {3106--3118}, year = {2014}, url = {https://doi.org/10.1016/j.cnsns.2014.02.011}, doi = {10.1016/J.CNSNS.2014.02.011}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cnsns/AneesSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cnsns/HuangY14, author = {Xiaoling Huang and Guodong Ye}, title = {An efficient self-adaptive model for chaotic image encryption algorithm}, journal = {Commun. Nonlinear Sci. Numer. Simul.}, volume = {19}, number = {12}, pages = {4094--4104}, year = {2014}, url = {https://doi.org/10.1016/j.cnsns.2014.04.012}, doi = {10.1016/J.CNSNS.2014.04.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cnsns/HuangY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/WangLB14, author = {Xingyuan Wang and Dapeng Luan and Xuemei Bao}, title = {Cryptanalysis of an image encryption algorithm using Chebyshev generator}, journal = {Digit. Signal Process.}, volume = {25}, pages = {244--247}, year = {2014}, url = {https://doi.org/10.1016/j.dsp.2013.10.020}, doi = {10.1016/J.DSP.2013.10.020}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/WangLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ShenZZ14, author = {Haojie Shen and Li Zhuo and Yingdi Zhao}, title = {An efficient motion reference structure based selective encryption algorithm for {H.264} videos}, journal = {{IET} Inf. Secur.}, volume = {8}, number = {3}, pages = {199--206}, year = {2014}, url = {https://doi.org/10.1049/iet-ifs.2012.0349}, doi = {10.1049/IET-IFS.2012.0349}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ShenZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imst/KannammalR14, author = {Kannammal Annadurai and S. Subha Rani}, title = {Two level security for medical images using watermarking/encryption algorithms}, journal = {Int. J. Imaging Syst. Technol.}, volume = {24}, number = {1}, pages = {111--120}, year = {2014}, url = {https://doi.org/10.1002/ima.22086}, doi = {10.1002/IMA.22086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imst/KannammalR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HermassiBRB14, author = {Houcemeddine Hermassi and Akram Belazi and Rhouma Rhouma and Safya Belghith}, title = {Security analysis of an image encryption algorithm based on a {DNA} addition combining with chaotic maps}, journal = {Multim. Tools Appl.}, volume = {72}, number = {3}, pages = {2211--2224}, year = {2014}, url = {https://doi.org/10.1007/s11042-013-1533-6}, doi = {10.1007/S11042-013-1533-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HermassiBRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuangY14, author = {Xiaoling Huang and Guodong Ye}, title = {An image encryption algorithm based on hyper-chaos and {DNA} sequence}, journal = {Multim. Tools Appl.}, volume = {72}, number = {1}, pages = {57--70}, year = {2014}, url = {https://doi.org/10.1007/s11042-012-1331-6}, doi = {10.1007/S11042-012-1331-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HuangY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuK14, author = {Fuwen Liu and Hartmut K{\"{o}}nig}, title = {Puzzle - an efficient, compression independent video encryption algorithm}, journal = {Multim. Tools Appl.}, volume = {73}, number = {2}, pages = {715--735}, year = {2014}, url = {https://doi.org/10.1007/s11042-012-1185-y}, doi = {10.1007/S11042-012-1185-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccomm/Diaconu14, author = {Adrian{-}Viorel Diaconu}, title = {An image encryption algorithm with a chaotic dynamical system based Sudoku Grid}, booktitle = {10th International Conference on Communications, {COMM} 2014, Bucharest, Romania, May 29-31, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICComm.2014.6866666}, doi = {10.1109/ICCOMM.2014.6866666}, timestamp = {Fri, 01 Apr 2022 12:37:24 +0200}, biburl = {https://dblp.org/rec/conf/iccomm/Diaconu14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HsiaoL14, author = {Feng{-}Hsiag Hsiao and Guang{-}Wei Liou}, title = {Application of Advanced Encryption Standard to Chaotic Synchronization Systems: Using an Improved Genetic Algorithm as Auxiliary}, booktitle = {2014 International Conference on {IT} Convergence and Security, 10.1109/ICITCS.2014, Beijing, China, October 28-30, 2014}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICITCS.2014.7021740}, doi = {10.1109/ICITCS.2014.7021740}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/HsiaoL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfi/FuYMY14, author = {Yong Fu and Xiaowei Yi and Hengtai Ma and Xiaowei Yi}, title = {An encryption algorithm of {JPEG2000} streams for supporting ciphertext-based transcoding}, booktitle = {International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, {MFI} 2014, Beijing, China, September 28-29, 2014}, pages = {1--7}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MFI.2014.6997647}, doi = {10.1109/MFI.2014.6997647}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/mfi/FuYMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZengLZLW14, author = {Li Zeng and Renren Liu and Leo Yu Zhang and Yuansheng Liu and Kwok{-}Wo Wong}, title = {Cryptanalyzing an image encryption algorithm based on scrambling and Veginere cipher}, journal = {CoRR}, volume = {abs/1409.4845}, year = {2014}, url = {http://arxiv.org/abs/1409.4845}, eprinttype = {arXiv}, eprint = {1409.4845}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZengLZLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cas/AnghelescuII13, author = {Petre Anghelescu and Silviu Ionita and Vasile{-}Gabriel Iana}, title = {High-Speed {PCA} Encryption Algorithm using Reconfigurable Computing}, journal = {Cybern. Syst.}, volume = {44}, number = {4}, pages = {285--304}, year = {2013}, url = {https://doi.org/10.1080/01969722.2013.783375}, doi = {10.1080/01969722.2013.783375}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cas/AnghelescuII13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/KeLN13, author = {Peng Ke and Yuanxiang Li and Fuchuan Ni}, title = {An evolvable cellular automata based data encryption algorithm}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {6}, number = {1}, pages = {66--71}, year = {2013}, url = {https://doi.org/10.1504/IJWMC.2013.053036}, doi = {10.1504/IJWMC.2013.053036}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/KeLN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/VaralakshmiS13, author = {L. M. Varalakshmi and G. Florence Sudha}, title = {An enhanced encryption algorithm for video based on multiple Huffman tables}, journal = {Multim. Tools Appl.}, volume = {64}, number = {3}, pages = {717--729}, year = {2013}, url = {https://doi.org/10.1007/s11042-011-0963-2}, doi = {10.1007/S11042-011-0963-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/VaralakshmiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rcs/AcevedoMAM13, author = {Elena Acevedo and {\'{A}}ngel Mart{\'{\i}}nez and Marco Antonio Acevedo{-}Mosqueda and Fabiola Mart{\'{\i}}nez}, title = {A Novel Text Encryption Algorithm}, journal = {Res. Comput. Sci.}, volume = {68}, pages = {91--101}, year = {2013}, url = {http://www.micai.org/rcs/2013\_68/A\%20Novel\%20Text\%20Encryption\%20Algorithm.pdf}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rcs/AcevedoMAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/HermassiRB13, author = {Houcemeddine Hermassi and Rhouma Rhouma and Safya Belghith}, title = {Improvement of an image encryption algorithm based on hyper-chaos}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {539--549}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9459-7}, doi = {10.1007/S11235-011-9459-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/HermassiRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ems/KesterNPG13, author = {Quist{-}Aphetsi Kester and Laurent Nana and Anca Christine Pascu and Sophie Gire}, editor = {David Al{-}Dabass and Alessandra Orsoni and Zheng Xie}, title = {A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and {RGB} Pixel Shuffling}, booktitle = {Seventh UKSim/AMSS European Modelling Symposium, {EMS} 2013, 20-22 November, 2013, Manchester {UK}}, pages = {305--311}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/EMS.2013.53}, doi = {10.1109/EMS.2013.53}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/ems/KesterNPG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/XiaoLRYL13, author = {Limin Xiao and Yongnan Li and Li Ruan and Guangchao Yao and Deguo Li}, title = {High Performance Implementation of {ARIA} Encryption Algorithm on Graphics Processing Units}, booktitle = {10th {IEEE} International Conference on High Performance Computing and Communications {\&} 2013 {IEEE} International Conference on Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China, November 13-15, 2013}, pages = {504--510}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/HPCC.and.EUC.2013.78}, doi = {10.1109/HPCC.AND.EUC.2013.78}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/XiaoLRYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/MahmoodDA13, author = {Ahmed B. Mahmood and Robert D. Dony and Shawki Areibi}, title = {An adaptive encryption based genetic algorithms for medical images}, booktitle = {{IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2013, Southampton, United Kingdom, September 22-25, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/MLSP.2013.6661920}, doi = {10.1109/MLSP.2013.6661920}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/mlsp/MahmoodDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siu/OzkaynakOY13, author = {Fatih {\"{O}}zkaynak and Ahmet Bedri {\"{O}}zer and Sirma Yavuz}, title = {Security analysis of an image encryption algorithm based on chaos and {DNA} encoding}, booktitle = {21st Signal Processing and Communications Applications Conference, {SIU} 2013, Haspolat, Turkey, April 24-26, 2013}, pages = {1--4}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SIU.2013.6531597}, doi = {10.1109/SIU.2013.6531597}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/siu/OzkaynakOY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Bonham-CarterPB13, author = {Oliver Bonham{-}Carter and Abhishek Parakh and Dhundy Bastola}, title = {sEncrypt: An Encryption Algorithm Inspired from Biological Processes}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {321--327}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.43}, doi = {10.1109/TRUSTCOM.2013.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Bonham-CarterPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-3485, author = {Ajay Kulkarni and Saurabh Kulkarni and Ketki Haridas and Aniket More}, title = {Proposed Video Encryption Algorithm v/s Other Existing Algorithms: {A} Comparative Study}, journal = {CoRR}, volume = {abs/1303.3485}, year = {2013}, url = {http://arxiv.org/abs/1303.3485}, eprinttype = {arXiv}, eprint = {1303.3485}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-3485.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/ZhaoLWP12, author = {Pengtao Zhao and Gang Liu and Minghao Wang and Jieli Peng}, editor = {Tianqi Zhang}, title = {An image encryption algorithm based on multi-scroll chaotic map}, booktitle = {5th International Conference on BioMedical Engineering and Informatics, {BMEI} 2012, Chongqing, China, October 16-18, 2012}, pages = {186--189}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/BMEI.2012.6512885}, doi = {10.1109/BMEI.2012.6512885}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmei/ZhaoLWP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/TiwariSG12, author = {Kamlesh Tiwari and Ehtesham Akhtar Siddiqui and Phalguni Gupta}, editor = {De{-}Shuang Huang and Phalguni Gupta and Xiang Zhang and Prashan Premaratne}, title = {An Efficient Image Database Encryption Algorithm}, booktitle = {Emerging Intelligent Computing Technology and Applications - 8th International Conference, {ICIC} 2012, Huangshan, China, July 25-29, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {304}, pages = {400--407}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31837-5\_58}, doi = {10.1007/978-3-642-31837-5\_58}, timestamp = {Tue, 23 May 2017 01:06:39 +0200}, biburl = {https://dblp.org/rec/conf/icic/TiwariSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/RajGD12, author = {R. Arun Raj and Sudhish N. George and P. P. Deepthi}, title = {An expeditious chaos based digital image encryption algorithm}, booktitle = {1st International Conference on Recent Advances in Information Technology, {RAIT} 2012, Dhanbad, India, March 15-17, 2012}, pages = {14--18}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/RAIT.2012.6194471}, doi = {10.1109/RAIT.2012.6194471}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/rait/RajGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rivf/HoangN12, author = {Trang Hoang and Van Loi Nguyen}, title = {An Efficient {FPGA} Implementation of the Advanced Encryption Standard Algorithm}, booktitle = {2012 {IEEE} {RIVF} International Conference on Computing {\&} Communication Technologies, Research, Innovation, and Vision for the Future (RIVF), Ho Chi Minh City, Vietnam, February 27 - March 1, 2012}, pages = {1--4}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/rivf.2012.6169845}, doi = {10.1109/RIVF.2012.6169845}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/rivf/HoangN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rws/ZibidehM12, author = {Walid Y. Zibideh and Mustafa M. Matalgah}, title = {An optimized encryption framework based on the modified-DES algorithm: {A} trade-off between security and throughput in wireless channels}, booktitle = {2012 {IEEE} Radio and Wireless Symposium, {RWS} 2012, Santa Clara, CA, USA, January 15-18, 2012}, pages = {419--422}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/RWS.2012.6175391}, doi = {10.1109/RWS.2012.6175391}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/rws/ZibidehM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AvireddyPGKTGGP12, author = {Srinivas Avireddy and Varalakshmi Perumal and Narayan Gowraj and Ram Srivatsa Kannan and Prashanth Thinakaran and Sundaravadanam Ganapthi and Jashwant Raj Gunasekaran and Sruthi Prabhu}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Random4: An Application Specific Randomized Encryption Algorithm to Prevent {SQL} Injection}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {1327--1333}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.232}, doi = {10.1109/TRUSTCOM.2012.232}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AvireddyPGKTGGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsp/Anghelescu12, author = {Petre Anghelescu}, title = {Hardware implementation of programmable cellular automata encryption algorithm}, booktitle = {35th International Conference on Telecommunications and Signal Processing, {TSP} 2012, Prague, Czech Republic, July 3-4, 2012}, pages = {18--21}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/TSP.2012.6256189}, doi = {10.1109/TSP.2012.6256189}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/tsp/Anghelescu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1204-1651, author = {Ali Elouafiq}, title = {Authentication and Encryption in {GSM} and 3GUMTS: An Emphasis on Protocols and Algorithms}, journal = {CoRR}, volume = {abs/1204.1651}, year = {2012}, url = {http://arxiv.org/abs/1204.1651}, eprinttype = {arXiv}, eprint = {1204.1651}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1204-1651.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-4777, author = {Ahmed Bashir Abugharsa and Abd. Samad Hasan Basari and Hamida Almangush}, title = {A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the {AES} Algorithm}, journal = {CoRR}, volume = {abs/1209.4777}, year = {2012}, url = {http://arxiv.org/abs/1209.4777}, eprinttype = {arXiv}, eprint = {1209.4777}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-4777.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1211-2338, author = {Roohallah Rastaghi}, title = {An Efficient Encryption Algorithm for {P2P} Networks Robust Against Man-in-the-Middle Adversary}, journal = {CoRR}, volume = {abs/1211.2338}, year = {2012}, url = {http://arxiv.org/abs/1211.2338}, eprinttype = {arXiv}, eprint = {1211.2338}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1211-2338.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/LiCL11, author = {Chengqing Li and Michael Z. Q. Chen and Kwok{-}Tung Lo}, title = {Breaking an Image Encryption Algorithm Based on Chaos}, journal = {Int. J. Bifurc. Chaos}, volume = {21}, number = {7}, pages = {2067--2076}, year = {2011}, url = {https://doi.org/10.1142/S0218127411029641}, doi = {10.1142/S0218127411029641}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/LiCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnc/BoKNI11, author = {Bo Song and Kensuke Kawakami and Koji Nakano and Yasuaki Ito}, title = {An {RSA} Encryption Hardware Algorithm using a Single {DSP} Block and a Single Block {RAM} on the {FPGA}}, journal = {Int. J. Netw. Comput.}, volume = {1}, number = {2}, pages = {277--289}, year = {2011}, url = {http://www.ijnc.org/index.php/ijnc/article/view/29}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnc/BoKNI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XiangG11, author = {Fei Xiang and Xiao{-}cong Guo}, editor = {Yuping Wang and Yiu{-}ming Cheung and Ping Guo and Yingbin Wei}, title = {An Image Encryption Algorithm Based on Scrambling and Substitution Using Hybrid Chaotic Systems}, booktitle = {Seventh International Conference on Computational Intelligence and Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011}, pages = {882--885}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CIS.2011.199}, doi = {10.1109/CIS.2011.199}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XiangG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csee2/TongL11, author = {Xiaojun Tong and Yang Liu}, editor = {Song Lin and Xiong Huang}, title = {An Image Encryption Algorithm for New Multiple Chaos-Based}, booktitle = {Advances in Computer Science, Environment, Ecoinformatics, and Education - International Conference, {CSEE} 2011, Wuhan, China, August 21-22, 2011. Proceedings, Part {V}}, series = {Communications in Computer and Information Science}, volume = {218}, pages = {88--93}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23357-9\_17}, doi = {10.1007/978-3-642-23357-9\_17}, timestamp = {Tue, 19 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csee2/TongL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csise/JinGZ11, author = {Yong{-}Xian Jin and Yi{-}Sheng Guan and Lin Zheng}, editor = {David Jin and Sally Lin}, title = {An Image Encryption Algorithm Based on Chaos}, booktitle = {Advances in Computer Science, Intelligent System and Environment [Proceedings of {CSISE} 2011, Volume 3, September 24-25, 2011, Guangzhou, China]}, series = {Advances in Intelligent and Soft Computing}, volume = {106}, pages = {493--497}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23753-9\_79}, doi = {10.1007/978-3-642-23753-9\_79}, timestamp = {Fri, 19 May 2017 01:26:02 +0200}, biburl = {https://dblp.org/rec/conf/csise/JinGZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccs/Acharya11, author = {Anuja Kumar Acharya}, editor = {Sanjay Kumar Jena and Rajeev Kumar and Ashok Kumar Turuk and Manoranjan Dash}, title = {Image encryption using a new chaos based encryption algorithm}, booktitle = {Proceedings of the 2011 International Conference on Communication, Computing {\&} Security, {ICCCS} 2011, Odisha, India, February 12-14, 2011}, pages = {577--581}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1947940.1948060}, doi = {10.1145/1947940.1948060}, timestamp = {Sat, 22 Apr 2023 12:33:17 +0200}, biburl = {https://dblp.org/rec/conf/icccs/Acharya11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JeongLH11, author = {Kyung Chul Jeong and Dong Hoon Lee and Daewan Han}, editor = {Howon Kim}, title = {An Improved Known Plaintext Attack on {PKZIP} Encryption Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {235--247}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_16}, doi = {10.1007/978-3-642-31912-9\_16}, timestamp = {Wed, 01 Mar 2023 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/icisc/JeongLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AnghelescuII11, author = {Petre Anghelescu and Silviu Ionita and Vasile{-}Gabriel Iana}, title = {{FPGA} implementation of cellular automata based encryption algorithm for internet communications}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {208--213}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148379/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AnghelescuII11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwet/HingmireIA11, author = {Anil Hingmire and D. R. Ingle and Rahul Ambekar}, editor = {B. K. Mishra}, title = {A new data encryption {\&} decryption algorithm {(PSZ} proposal): a comparison with {RSA}}, booktitle = {Proceedings of the {ICWET} '11 International Conference {\&} Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25 - 26, 2011}, pages = {1366}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1980022.1980361}, doi = {10.1145/1980022.1980361}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwet/HingmireIA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscid/MaoC11, author = {Yongyi Mao and Xiang Chen}, title = {An Encryption Algorithm of Chaos Based on Sine Square Mapping}, booktitle = {4th International Symposium on Computational Intelligence and Design, {ISCID} 2011, Hangzhou, China, October 28-30, 2011, 2 Volumes}, pages = {131--134}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ISCID.2011.41}, doi = {10.1109/ISCID.2011.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscid/MaoC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscide/ZhangLSZC11, author = {Xuanping Zhang and Zhigang Liang and Liping Shao and Yuqian Zhang and Qingyuan Chen}, editor = {Yanning Zhang and Zhi{-}Hua Zhou and Changshui Zhang and Ying Li}, title = {An Image Encryption Algorithm Based on Small Permutation Array Combining}, booktitle = {Intelligent Science and Intelligent Data Engineering - Second Sino-foreign-interchange Workshop, IScIDE 2011, Xi'an, China, October 23-25, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7202}, pages = {652--659}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31919-8\_83}, doi = {10.1007/978-3-642-31919-8\_83}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/iscide/ZhangLSZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socpar/MittalM11, author = {Varun Mittal and Piyush Murli Agarwal}, editor = {Ajith Abraham and Hongbo Liu and Fuchun Sun and Chen Guo and Se{\'{a}}n F. McLoone and Emilio Corchado}, title = {An encryption and decryption algorithm for messages transmitted by phonetic alphabets}, booktitle = {Third International Conference of Soft Computing and Pattern Recognition, SoCPaR 2011, Dalian, China, October 14-16, 2011}, pages = {1--4}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SoCPaR.2011.6089104}, doi = {10.1109/SOCPAR.2011.6089104}, timestamp = {Wed, 20 Jan 2021 09:06:52 +0100}, biburl = {https://dblp.org/rec/conf/socpar/MittalM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcis/Anghelescu11, author = {Petre Anghelescu}, title = {Encryption algorithm using Programmable Cellular Automata}, booktitle = {2011 World Congress on Internet Security, WorldCIS 2011, London, UK, February 21-23, 2011}, pages = {233--239}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5749858/}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/worldcis/Anghelescu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Chmielowiec10, author = {Andrzej Chmielowiec}, title = {Fixed points of the {RSA} encryption algorithm}, journal = {Theor. Comput. Sci.}, volume = {411}, number = {1}, pages = {288--292}, year = {2010}, url = {https://doi.org/10.1016/j.tcs.2009.09.030}, doi = {10.1016/J.TCS.2009.09.030}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/Chmielowiec10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/SongKNI10, author = {Bo Song and Kensuke Kawakami and Koji Nakano and Yasuaki Ito}, title = {An {RSA} Encryption Hardware Algorithm Using a Single {DSP} Block and a Single Block {RAM} on the {FPGA}}, booktitle = {First International Conference on Networking and Computing, {ICNC} 2010, Higashi Hiroshima, Japan, November 17-19, 2010. Proceedings}, pages = {140--147}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IC-NC.2010.56}, doi = {10.1109/IC-NC.2010.56}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/SongKNI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwet/WattalAK10, author = {Akshay Wattal and Anjali Agarwal and Ankit Kathuria}, editor = {B. K. Mishra}, title = {Astute image encryption and decryption using modified secure image encryption algorithm {(M-SIP)}}, booktitle = {Proceedings of the {ICWET} '10 International Conference {\&} Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26 - 27, 2010}, pages = {1007}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741906.1742176}, doi = {10.1145/1741906.1742176}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwet/WattalAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OguraYKU10, author = {Naoki Ogura and Go Yamamoto and Tetsutaro Kobayashi and Shigenori Uchiyama}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {70--83}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_6}, doi = {10.1007/978-3-642-16825-3\_6}, timestamp = {Mon, 15 Jun 2020 17:00:57 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OguraYKU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skg/XiaoCX10, author = {Qili Xiao and Bencheng Chai and Qimin Xiao}, title = {An Image Encryption Algorithm Based on Sequence}, booktitle = {Sixth International Conference on Semantics Knowledge and Grid, {SKG} 2010, Beijing, China, November 1-3, 2010}, pages = {398--401}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SKG.2010.69}, doi = {10.1109/SKG.2010.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skg/XiaoCX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1007-3862, author = {Chengqing Li and Michael Z. Q. Chen and Kwok{-}Tung Lo}, title = {Breaking an image encryption algorithm based on chaos}, journal = {CoRR}, volume = {abs/1007.3862}, year = {2010}, url = {http://arxiv.org/abs/1007.3862}, eprinttype = {arXiv}, eprint = {1007.3862}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1007-3862.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ChenH09, author = {Ming{-}Chih Chen and Shen{-}Fu Hsiao}, title = {Low Cost Design of an Advanced Encryption Standard {(AES)} Processor Using a New Common-Subexpression-Elimination Algorithm}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {12}, pages = {3221--3228}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.3221}, doi = {10.1587/TRANSFUN.E92.A.3221}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ChenH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChardinM09, author = {Thomas Chardin and Rapha{\"{e}}l Marinier}, title = {An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm}, journal = {Int. J. Netw. Secur.}, volume = {9}, number = {2}, pages = {173--179}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v9-n2/ijns-2009-v9-n2-p173-179.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChardinM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/LiuSX09, author = {Shubo Liu and Jing Sun and Zhengquan Xu}, title = {An Improved Image Encryption Algorithm based on Chaotic System}, journal = {J. Comput.}, volume = {4}, number = {11}, pages = {1091--1100}, year = {2009}, url = {http://www.jcomputers.us/index.php?m=content\&c=index\&a=show\&catid=98\&id=1465}, doi = {10.4304/JCP.4.11.1091-1100}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/LiuSX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppl/Wuensche09, author = {Andrew Wuensche}, title = {Cellular Automata Encryption: the reverse algorithm, Z-parameter and chain-rules}, journal = {Parallel Process. Lett.}, volume = {19}, number = {2}, pages = {283--297}, year = {2009}, url = {https://doi.org/10.1142/S0129626409000225}, doi = {10.1142/S0129626409000225}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppl/Wuensche09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/WangBZS09, author = {Fangchao Wang and Sen Bai and Guibin Zhu and Zhenghui Song}, editor = {Huaikou Miao and Gongzhu Hu}, title = {An Image Encryption Algorithm Based on N-Dimension Affine Transformation}, booktitle = {8th {IEEE/ACIS} International Conference on Computer and Information Science, {IEEE/ACIS} {ICIS} 2009, June 1-3, 2009, Shanghai, China}, pages = {579--585}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICIS.2009.31}, doi = {10.1109/ICIS.2009.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/WangBZS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/LuY09, author = {Wei Lu and Zheng{-}an Yao}, editor = {Ronghuai Huang and Qiang Yang and Jian Pei and Jo{\~{a}}o Gama and Xiaofeng Meng and Xue Li}, title = {Nearest Neighbor Tour Circuit Encryption Algorithm Based Random Isomap Reduction}, booktitle = {Advanced Data Mining and Applications, 5th International Conference, {ADMA} 2009, Beijing, China, August 17-19, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5678}, pages = {246--252}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03348-3\_25}, doi = {10.1007/978-3-642-03348-3\_25}, timestamp = {Sun, 02 Oct 2022 15:53:57 +0200}, biburl = {https://dblp.org/rec/conf/adma/LuY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/YahyaA09, author = {Adbelfatah Yahya and Ayman M. Abdalla}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {An AES-Based Encryption Algorithm with Shuffling}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {113--116}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 20 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/YahyaA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/WangZL09, author = {Xiao{-}yu Wang and Han Zhang and Zhao{-}hui Li}, editor = {Haiying Wang and Kay Soon Low and Kexin Wei and Junqing Sun}, title = {An Improved Baptista Encryption Algorithm Based on Conservative Chaotic System}, booktitle = {Fifth International Conference on Natural Computation, {ICNC} 2009, Tianjian, China, 14-16 August 2009, 6 Volumes}, pages = {442--446}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICNC.2009.589}, doi = {10.1109/ICNC.2009.589}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnc/WangZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/LiY09, author = {Weihai Li and Yuan Yuan}, title = {Improving Security of an Image Encryption Algorithm based on Chaotic Circular Shift}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, San Antonio, TX, USA, 11-14 October 2009}, pages = {3694--3698}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICSMC.2009.5346875}, doi = {10.1109/ICSMC.2009.5346875}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smc/LiY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/ZhuZ08, author = {Gui{-}Liang Zhu and Xiaoqiang Zhang}, title = {Mixed image element encryption algorithm based on an elliptic curve cryptosystem}, journal = {J. Electronic Imaging}, volume = {17}, number = {2}, pages = {023007}, year = {2008}, url = {https://doi.org/10.1117/1.2931495}, doi = {10.1117/1.2931495}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/ZhuZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/DeleiSW08, author = {Jiang Delei and Bai Sen and Dong Wenming}, title = {An Image Encryption Algorithm Based on Knight's Tour and Slip Encryption-Filter}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 1: Artificial Intelligence, December 12-14, 2008, Wuhan, China}, pages = {251--255}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.1142}, doi = {10.1109/CSSE.2008.1142}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/DeleiSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his/AnghelescuIS08, author = {Petre Anghelescu and Silviu Ionita and Emil Sofron}, editor = {Fatos Xhafa and Francisco Herrera and Ajith Abraham and Mario K{\"{o}}ppen and Jos{\'{e}} Manuel Ben{\'{\i}}tez}, title = {{FPGA} Implementation of Hybrid Additive Programmable Cellular Automata Encryption Algorithm}, booktitle = {8th International Conference on Hybrid Intelligent Systems {(HIS} 2008), September 10-12, 2008, Barcelona, Spain}, pages = {96--101}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HIS.2008.24}, doi = {10.1109/HIS.2008.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/his/AnghelescuIS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/Henricksen08, author = {Matthew Henricksen}, title = {Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks}, booktitle = {10th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2008, 25-27 Sept. 2008, Dalian, China}, pages = {795--800}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HPCC.2008.51}, doi = {10.1109/HPCC.2008.51}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/Henricksen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/ChenZY08, author = {Dongming Chen and Zhiliang Zhu and Guangming Yang}, title = {An Improved Image Encryption Algorithm Based on Chaos}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {2792--2796}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.519}, doi = {10.1109/ICYCS.2008.519}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/ChenZY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/LiP08, author = {Shuaijun Li and Fei Peng}, title = {An Encryption Algorithm for 2D Engineering Graphics' Content Based on Chaos Systems}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {1435--1439}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.111}, doi = {10.1109/ICYCS.2008.111}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/LiP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paciia/WangYY08, author = {JiaJing Wang and BaiLong Yang and Zhe Yang}, title = {An Algorithm of Information Hiding Based on Compound Encryption in Non-Uniform B-Spline Wavelet Domain}, booktitle = {{PACIIA} 2008, Volume 2, 2008 {IEEE} Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China}, pages = {190--194}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PACIIA.2008.274}, doi = {10.1109/PACIIA.2008.274}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paciia/WangYY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5116, author = {David A. McGrew}, title = {An Interface and Algorithms for Authenticated Encryption}, journal = {{RFC}}, volume = {5116}, pages = {1--22}, year = {2008}, url = {https://doi.org/10.17487/RFC5116}, doi = {10.17487/RFC5116}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/NgW07, author = {Danny Ng and Andrew Woodward}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Implications for Use of Different Encryption Algorithms on Power Consumption for Mobile Devices in the Healthcare Industry}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {496--500}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 16:45:17 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/NgW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/ChrysosDBM07, author = {Grigorios Chrysos and Apostolos Dollas and Nikolaos G. Bourbakis and J. Sukarno Mertoguno}, editor = {Kenneth L. Pocek and Duncan A. Buell}, title = {An Integrated Video Compression, Encryption and Information Hiding Architecture based on the {SCAN} Algorithm and the Stretch Technology}, booktitle = {{IEEE} Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}}, pages = {327--330}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FCCM.2007.37}, doi = {10.1109/FCCM.2007.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/ChrysosDBM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/FuZC07, author = {Chong Fu and Zhen{-}chuan Zhang and Ying{-}yu Cao}, editor = {Jingsheng Lei and JingTao Yao and Qingfu Zhang}, title = {An Improved Image Encryption Algorithm Based on Chaotic Maps}, booktitle = {Third International Conference on Natural Computation, {ICNC} 2007, Haikou, Hainan, China, 24-27 August 2007, Volume 3}, pages = {189--193}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNC.2007.215}, doi = {10.1109/ICNC.2007.215}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnc/FuZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/MianJL07, author = {Mian Cai and Jia Jia and Yan Lei}, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {An {H.264} Video Encryption Algorithm Based On Entropy Coding}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {41--44}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIH-MSP.2007.86}, doi = {10.1109/IIH-MSP.2007.86}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/MianJL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/DongLXHJ07, author = {Chen Dong and Jifang Li and Lifeng Xi and Jie Hao and Ran Jin}, editor = {Bruno Apolloni and Robert J. Howlett and Lakhmi C. Jain}, title = {Improvement of an Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, {KES} 2007, {XVII} Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4693}, pages = {209--216}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74827-4\_27}, doi = {10.1007/978-3-540-74827-4\_27}, timestamp = {Fri, 01 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kes/DongLXHJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0710-4800, author = {Hala A. Farouk and Magdy Saeb}, title = {An Improved {FPGA} Implementation of the Modified Hybrid Hiding Encryption Algorithm {(MHHEA)} for Data Communication Security}, journal = {CoRR}, volume = {abs/0710.4800}, year = {2007}, url = {http://arxiv.org/abs/0710.4800}, eprinttype = {arXiv}, eprint = {0710.4800}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0710-4800.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0710-5465, author = {David Arroyo and Chengqing Li and Shujun Li and Gonzalo {\'{A}}lvarez and Wolfgang A. Halang}, title = {Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm}, journal = {CoRR}, volume = {abs/0710.5465}, year = {2007}, url = {http://arxiv.org/abs/0710.5465}, eprinttype = {arXiv}, eprint = {0710.5465}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0710-5465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icicic/GuH06, author = {Guosheng Gu and Guoqiang Han}, title = {An Enhanced Chaos Based Image Encryption Algorithm}, booktitle = {First International Conference on Innovative Computing, Information and Control {(ICICIC} 2006), 30 August - 1 September 2006, Beijing, China}, pages = {492--495}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICICIC.2006.46}, doi = {10.1109/ICICIC.2006.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icicic/GuH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/KitsosGK05, author = {Paris Kitsos and Michalis D. Galanis and Odysseas G. Koufopavlou}, title = {An Fpga Implementation of the Gprs Encryption Algorithm 3 (gea3)}, journal = {J. Circuits Syst. Comput.}, volume = {14}, number = {2}, pages = {217--232}, year = {2005}, url = {https://doi.org/10.1142/S0218126605002337}, doi = {10.1142/S0218126605002337}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsc/KitsosGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/ThaduriYG05, author = {M. Thaduri and Seong{-}Moo Yoo and Rhonda Kay Gaede}, title = {An efficient {VLSI} implementation of {IDEA} encryption algorithm using {VHDL}}, journal = {Microprocess. Microsystems}, volume = {29}, number = {1}, pages = {1--7}, year = {2005}, url = {https://doi.org/10.1016/j.micpro.2004.06.002}, doi = {10.1016/J.MICPRO.2004.06.002}, timestamp = {Fri, 20 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/ThaduriYG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/Arafat05, author = {S. M. Arafat}, title = {An encryption algorithm based on alphabetic trees}, booktitle = {2005 {ACS} / {IEEE} International Conference on Computer Systems and Applications {(AICCSA} 2005), January 3-6, 2005, Cairo, Egypt}, pages = {92}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AICCSA.2005.1387083}, doi = {10.1109/AICCSA.2005.1387083}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/Arafat05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/FaroukS05, author = {Hala A. Farouk and Magdy Saeb}, title = {An Improved {FPGA} Implementation of the Modified Hybrid Hiding Encryption Algorithm {(MHHEA)} for Data Communication Security}, booktitle = {2005 Design, Automation and Test in Europe Conference and Exposition {(DATE} 2005), 7-11 March 2005, Munich, Germany}, pages = {76--81}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/DATE.2005.58}, doi = {10.1109/DATE.2005.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/FaroukS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/ErgulerA05, author = {Imran Erguler and Emin Anarim}, title = {A modified stream generator for the {GSM} encryption algorithms {A5/1} and {A5/2}}, booktitle = {13th European Signal Processing Conference, {EUSIPCO} 2005, Antalya, Turkey, September 4-8, 2005}, pages = {1--4}, publisher = {{IEEE}}, year = {2005}, url = {https://ieeexplore.ieee.org/document/7078405/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/ErgulerA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/WangH04, author = {Pang{-}Chieh Wang and Ting{-}Wei Hou}, title = {An {AV} object oriented encryption algorithm for {MPEG-4} streams}, booktitle = {Proceedings of the 2004 {IEEE} International Conference on Multimedia and Expo, {ICME} 2004, 27-30 June 2004, Taipei, Taiwan}, pages = {971--974}, publisher = {{IEEE} Computer Society}, year = {2004}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/WangH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/WangN04, author = {Shuenn{-}Shyang Wang and Wan{-}Sheng Ni}, title = {An efficient {FPGA} implementation of advanced encryption standard algorithm}, booktitle = {Proceedings of the 2004 International Symposium on Circuits and Systems, {ISCAS} 2004, Vancouver, BC, Canada, May 23-26, 2004}, pages = {597--600}, publisher = {{IEEE}}, year = {2004}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/WangN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sbcci/Zigiottod02, author = {Anderson Cattelan Zigiotto and Roberto d'Amore}, title = {A Low-Cost {FPGA} Implementation of the Advanced Encryption Standard Algorithm}, booktitle = {Proceedings of the 15th Annual Symposium on Integrated Circuits and Systems Design, {SBCCI} 2002, Porto Alegre, Brazil, September 9-14, 2002}, pages = {191--196}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://dl.acm.org/doi/10.5555/827246.827394}, doi = {10.5555/827246.827394}, timestamp = {Fri, 10 Jun 2022 11:12:41 +0200}, biburl = {https://dblp.org/rec/conf/sbcci/Zigiottod02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GootsMM01, author = {Nick D. Goots and Alexander A. Moldovyan and Nick A. Moldovyan}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Fast Encryption Algorithm Spectr-H64}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {275--286}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_27}, doi = {10.1007/3-540-45116-1\_27}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GootsMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Law00, author = {Tak{-}Ming Law}, title = {An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2000}, url = {http://eprint.iacr.org/2000/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Law00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/WassalH99, author = {Amr G. Wassal and M. Anwarul Hasan}, title = {A {VLSI} Architecture for {ATM} Algorithm-Agile Encryption}, booktitle = {9th Great Lakes Symposium on {VLSI} {(GLS-VLSI} '99), 4-6 March 1999, Ann Arbor, MI, {USA}}, pages = {325}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/GLSV.1999.757444}, doi = {10.1109/GLSV.1999.757444}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/glvlsi/WassalH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MoldovyanM98, author = {Alexander A. Moldovyan and Nikolay A. Moldovyan}, title = {Software Encryption Algorithms for Transparent Protection Technology}, journal = {Cryptologia}, volume = {22}, number = {1}, pages = {56--68}, year = {1998}, url = {https://doi.org/10.1080/0161-119891886786}, doi = {10.1080/0161-119891886786}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MoldovyanM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/ShiB98, author = {Changgui Shi and Bharat K. Bhargava}, title = {An Efficient {MPEG} Video Encryption Algorithm}, booktitle = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS} 1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings}, pages = {381--386}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/RELDIS.1998.740527}, doi = {10.1109/RELDIS.1998.740527}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/ShiB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpa/Orlowski95, author = {Steve Orlowski}, editor = {Ed Dawson and Jovan Dj. Golic}, title = {Encryption and the Gloval Information Infrastructure: An Australian Perspective}, booktitle = {Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1029}, pages = {65--74}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0032346}, doi = {10.1007/BFB0032346}, timestamp = {Sat, 19 Oct 2019 20:36:44 +0200}, biburl = {https://dblp.org/rec/conf/cpa/Orlowski95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/WolterMSL95, author = {Stefan Wolter and Holger Matz and Andreas Schubert and Rainer Laur}, title = {On the {VLSI} Implementation of the International Data Encryption Algorithm {IDEA}}, booktitle = {1995 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 1995, Seattle, Washington, USA, April 30 - May 3, 1995}, pages = {397--400}, publisher = {{IEEE}}, year = {1995}, url = {https://doi.org/10.1109/ISCAS.1995.521534}, doi = {10.1109/ISCAS.1995.521534}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/WolterMSL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jssc/ZimmermannCBKFF94, author = {Reto Zimmermann and Andreas Curiger and Heinz Bonnenberg and Hubert Kaeslin and Norbert Felber and Wolfgang Fichtner}, title = {A 177 Mb/s {VLSI} implementation of the International Data Encryption Algorithm}, journal = {{IEEE} J. Solid State Circuits}, volume = {29}, number = {3}, pages = {303--307}, year = {1994}, url = {https://doi.org/10.1109/4.278352}, doi = {10.1109/4.278352}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jssc/ZimmermannCBKFF94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OrtonRSPT86, author = {Glenn A. Orton and M. P. Roy and P. Andrew Scott and Lloyd E. Peppard and Stafford E. Tavares}, editor = {Andrew M. Odlyzko}, title = {{VLSI} Implementation of Public-Key Encryption Algorithms}, booktitle = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California, USA, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {263}, pages = {277--301}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-47721-7\_22}, doi = {10.1007/3-540-47721-7\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OrtonRSPT86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.