Search dblp for Publications

export results for "An encryption algorithm."

 download as .bib file

@article{DBLP:journals/connection/Guvenoglu24,
  author       = {Erdal G{\"{u}}venoglu},
  title        = {An image encryption algorithm based on multi-layered chaotic maps
                  and its security analysis},
  journal      = {Connect. Sci.},
  volume       = {36},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1080/09540091.2024.2312108},
  doi          = {10.1080/09540091.2024.2312108},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/connection/Guvenoglu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/ZhangH24,
  author       = {Hangming Zhang and
                  Hanping Hu},
  title        = {An image encryption algorithm based on a compound-coupled chaotic
                  system},
  journal      = {Digit. Signal Process.},
  volume       = {146},
  pages        = {104367},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dsp.2023.104367},
  doi          = {10.1016/J.DSP.2023.104367},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/ZhangH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/AnLXZL24,
  author       = {Xinlei An and
                  Siyang Liu and
                  Li Xiong and
                  Jiangang Zhang and
                  Xinying Li},
  title        = {Mixed gray-color images encryption algorithm based on a memristor
                  chaotic system and 2D compression sensing},
  journal      = {Expert Syst. Appl.},
  volume       = {243},
  pages        = {122899},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.122899},
  doi          = {10.1016/J.ESWA.2023.122899},
  timestamp    = {Sun, 26 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/AnLXZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/WenL24,
  author       = {Heping Wen and
                  Yiting Lin},
  title        = {Cryptanalysis of an image encryption algorithm using quantum chaotic
                  map and {DNA} coding},
  journal      = {Expert Syst. Appl.},
  volume       = {237},
  number       = {Part {B}},
  pages        = {121514},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.121514},
  doi          = {10.1016/J.ESWA.2023.121514},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/WenL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/LiSL24,
  author       = {Chengqing Li and
                  Xianhui Shen and
                  Sheng Liu},
  title        = {Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex
                  Logistic Map},
  journal      = {{IEEE} Multim.},
  volume       = {31},
  number       = {1},
  pages        = {99--109},
  year         = {2024},
  url          = {https://doi.org/10.1109/MMUL.2024.3356494},
  doi          = {10.1109/MMUL.2024.3356494},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeemm/LiSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/RiazDNMAKBA24,
  author       = {Mamoon Riaz and
                  Hammad Dilpazir and
                  Sundus Naseer and
                  Hasan Mahmood and
                  Asim Anwar and
                  Junaid Khan and
                  Ian B. Benitez and
                  Tanveer Ahmad},
  title        = {Secure and Fast Image Encryption Algorithm Based on Modified Logistic
                  Map},
  journal      = {Inf.},
  volume       = {15},
  number       = {3},
  pages        = {172},
  year         = {2024},
  url          = {https://doi.org/10.3390/info15030172},
  doi          = {10.3390/INFO15030172},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/RiazDNMAKBA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/DennunzioFM24,
  author       = {Alberto Dennunzio and
                  Enrico Formenti and
                  Luciano Margara},
  title        = {An efficient algorithm deciding chaos for linear cellular automata
                  over (Z/mZ)n with applications to data encryption},
  journal      = {Inf. Sci.},
  volume       = {657},
  pages        = {119942},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.119942},
  doi          = {10.1016/J.INS.2023.119942},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/DennunzioFM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChenLTW24,
  author       = {Rong Chen and
                  Xiaomeng Li and
                  Lin Teng and
                  Xingyuan Wang},
  title        = {An image encryption algorithm based on the {LSCMM} chaotic map and
                  bidirectional dynamic diffusion},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {2},
  pages        = {3681--3706},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15810-2},
  doi          = {10.1007/S11042-023-15810-2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ChenLTW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HuZZB24,
  author       = {Yingjie Hu and
                  Qiuyu Zhang and
                  Qiwen Zhang and
                  Yujiao Ba},
  title        = {An intelligent homomorphic audio signal encryption algorithm for secure
                  interacting},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {9},
  pages        = {25675--25693},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16493-5},
  doi          = {10.1007/S11042-023-16493-5},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/HuZZB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiC24,
  author       = {Qingfeng Li and
                  Lei Chen},
  title        = {An image encryption algorithm based on 6-dimensional hyper chaotic
                  system and {DNA} encoding},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {2},
  pages        = {5351--5368},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15550-3},
  doi          = {10.1007/S11042-023-15550-3},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/LiC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/NaeemJKE24,
  author       = {Ensherah A. Naeem and
                  Anand B. Joshi and
                  Dhanesh Kumar and
                  Fathi E. Abd El{-}Samie},
  title        = {Few-detail image encryption algorithm based on diffusion and confusion
                  using Henon and Baker chaotic maps},
  journal      = {Soft Comput.},
  volume       = {28},
  number       = {4},
  pages        = {2851--2861},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00500-023-09333-z},
  doi          = {10.1007/S00500-023-09333-Z},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/NaeemJKE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WangTW24,
  author       = {Yafei Wang and
                  Lin Teng and
                  Xingyuan Wang},
  title        = {An image encryption algorithm based on circular rotation and generalized
                  Feistel structure},
  journal      = {Soft Comput.},
  volume       = {28},
  number       = {5},
  pages        = {4335--4358},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00500-023-08747-z},
  doi          = {10.1007/S00500-023-08747-Z},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/WangTW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HeCSW23,
  author       = {Chenchen He and
                  Zhong Chen and
                  Xiyu Sun and
                  Lujie Wang},
  title        = {An Algorithm Based on Hodgkin-Huxley Model and Latin Square for Image
                  Encryption},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {34163--34174},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3250758},
  doi          = {10.1109/ACCESS.2023.3250758},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HeCSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cam/HussainAA23,
  author       = {Iqtadar Hussain and
                  Amir Anees and
                  Temadher Alassiry Al{-}Maadeed},
  title        = {A novel encryption algorithm using multiple semifield S-boxes based
                  on permutation of symmetric group},
  journal      = {Comput. Appl. Math.},
  volume       = {42},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1007/s40314-023-02208-x},
  doi          = {10.1007/S40314-023-02208-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cam/HussainAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/GengLZW23,
  author       = {Shengtao Geng and
                  Jiahao Li and
                  Xuncai Zhang and
                  Yanfeng Wang},
  title        = {An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling
                  and Dynamic {DNA} Coding},
  journal      = {Entropy},
  volume       = {25},
  number       = {8},
  pages        = {1178},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25081178},
  doi          = {10.3390/E25081178},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/GengLZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/JiangYW23,
  author       = {Qinmao Jiang and
                  Simin Yu and
                  Qianxue Wang},
  title        = {Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional
                  Hyperchaotic Map},
  journal      = {Entropy},
  volume       = {25},
  number       = {3},
  pages        = {395},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25030395},
  doi          = {10.3390/E25030395},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/JiangYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhuZY23,
  author       = {Shuqin Zhu and
                  Congxu Zhu and
                  Hanyu Yan},
  title        = {Cryptanalyzing and Improving an Image Encryption Algorithm Based on
                  Chaotic Dual Scrambling of Pixel Position and Bit},
  journal      = {Entropy},
  volume       = {25},
  number       = {3},
  pages        = {400},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25030400},
  doi          = {10.3390/E25030400},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhuZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ict-express/LiWZL23,
  author       = {Cuiran Li and
                  Jixuan Wu and
                  Zepeng Zhang and
                  Anqi Lv},
  title        = {Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption
                  for {WSN}},
  journal      = {{ICT} Express},
  volume       = {9},
  number       = {6},
  pages        = {1077--1084},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.icte.2023.05.006},
  doi          = {10.1016/J.ICTE.2023.05.006},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ict-express/LiWZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/TangZCZNH23,
  author       = {Jianeng Tang and
                  Zezong Zhang and
                  Peiyang Chen and
                  Feng Zhang and
                  Hui Ni and
                  Zhongming Huang},
  title        = {An image layered scrambling encryption algorithm based on a novel
                  discrete chaotic map},
  journal      = {{IET} Image Process.},
  volume       = {17},
  number       = {2},
  pages        = {518--532},
  year         = {2023},
  url          = {https://doi.org/10.1049/ipr2.12651},
  doi          = {10.1049/IPR2.12651},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/TangZCZNH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/ZhengB23,
  author       = {Jiming Zheng and
                  Tianyu Bao},
  title        = {An image encryption algorithm based on cascade chaotic map and {DNA}
                  coding},
  journal      = {{IET} Image Process.},
  volume       = {17},
  number       = {12},
  pages        = {3510--3523},
  year         = {2023},
  url          = {https://doi.org/10.1049/ipr2.12882},
  doi          = {10.1049/IPR2.12882},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/ZhengB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/XuZ23,
  author       = {Jiangjian Xu and
                  Bing Zhao},
  title        = {Designing an Image Encryption Algorithm Based on Hyperchaotic System
                  and {DCT}},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {33},
  number       = {2},
  pages        = {2350021:1--2350021:22},
  year         = {2023},
  url          = {https://doi.org/10.1142/S0218127423500219},
  doi          = {10.1142/S0218127423500219},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbc/XuZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/Li23,
  author       = {Ju Li},
  title        = {Research on an optimised encryption algorithm for network information
                  security communication},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {29},
  number       = {1},
  pages        = {31--46},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJCNDS.2022.10044390},
  doi          = {10.1504/IJCNDS.2022.10044390},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/KiharaI23,
  author       = {Maki Kihara and
                  Satoshi Iriyama},
  title        = {Security Verification of an Authentication Algorithm Based on Verifiable
                  Encryption},
  journal      = {Inf.},
  volume       = {14},
  number       = {2},
  pages        = {126},
  year         = {2023},
  url          = {https://doi.org/10.3390/info14020126},
  doi          = {10.3390/INFO14020126},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/KiharaI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdiq/SinghS23,
  author       = {Kedar Nath Singh and
                  Amit Kumar Singh},
  title        = {An Improved Encryption-Compression-based Algorithm for Securing Digital
                  Images},
  journal      = {{ACM} J. Data Inf. Qual.},
  volume       = {15},
  number       = {2},
  pages        = {21:1--21:16},
  year         = {2023},
  url          = {https://doi.org/10.1145/3532783},
  doi          = {10.1145/3532783},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdiq/SinghS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/PrabhavathiAK23,
  author       = {K. Prabhavathi and
                  M. B. Anandaraju and
                  Kiran},
  title        = {An efficient medical image encryption algorithm for telemedicine applications},
  journal      = {Microprocess. Microsystems},
  volume       = {101},
  pages        = {104907},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.micpro.2023.104907},
  doi          = {10.1016/J.MICPRO.2023.104907},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/PrabhavathiAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChenYWGW23,
  author       = {Xin Chen and
                  Simin Yu and
                  Qianxue Wang and
                  Christophe Guyeux and
                  Mengjie Wang},
  title        = {On the cryptanalysis of an image encryption algorithm with quantum
                  chaotic map and {DNA} coding},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {27},
  pages        = {42717--42737},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-023-15003-x},
  doi          = {10.1007/S11042-023-15003-X},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/ChenYWGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/JiangLZWCR23,
  author       = {Donghua Jiang and
                  Lidong Liu and
                  Liya Zhu and
                  Xingyuan Wang and
                  Yingpin Chen and
                  Xianwei Rong},
  title        = {An efficient meaningful double-image encryption algorithm based on
                  parallel compressive sensing and {FRFT} embedding},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {18},
  pages        = {27337--27363},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-023-14601-z},
  doi          = {10.1007/S11042-023-14601-Z},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/JiangLZWCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MurilloEscobarQCL23,
  author       = {Miguel {\'{A}}ngel Murillo{-}Escobar and
                  Jos{\'{e}} Alfonso Quintana{-}Ibarra and
                  C{\'{e}}sar Cruz{-}Hern{\'{a}}ndez and
                  Rosa Martha L{\'{o}}pez{-}Guti{\'{e}}rrez},
  title        = {Biosignal encryption algorithm based on Ushio chaotic map for e-health},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {15},
  pages        = {23373--23399},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-14092-4},
  doi          = {10.1007/S11042-022-14092-4},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/MurilloEscobarQCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/OmranpourLT23,
  author       = {Hesam Omranpour and
                  Zeynab Mohammadi Ledari and
                  Masoumeh Taheri},
  title        = {Presentation of encryption method for {RGB} images based on an evolutionary
                  algorithm using chaos functions and hash tables},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {6},
  pages        = {9343--9360},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-13734-x},
  doi          = {10.1007/S11042-022-13734-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/OmranpourLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ShafaiAAA23,
  author       = {Walid El Shafai and
                  Iman M. Almomani and
                  Anees Ara and
                  Aala Alkhayer},
  title        = {An optical-based encryption and authentication algorithm for color
                  and grayscale medical images},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {15},
  pages        = {23735--23770},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-14093-3},
  doi          = {10.1007/S11042-022-14093-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ShafaiAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SharmaRB23,
  author       = {Madhu Sharma and
                  Ranjeet Kumar Ranjan and
                  Vishal Bharti},
  title        = {An image encryption algorithm based on a novel hyperchaotic Henon
                  sine map},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {8},
  pages        = {11949--11972},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-13733-y},
  doi          = {10.1007/S11042-022-13733-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SharmaRB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XieGZ23,
  author       = {Hongwei Xie and
                  Ya{-}jun Gao and
                  Hao Zhang},
  title        = {An image encryption algorithm based on novel block scrambling scheme
                  and Josephus sequence generator},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {11},
  pages        = {16431--16453},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-14139-6},
  doi          = {10.1007/S11042-022-14139-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XieGZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhangWYL23,
  author       = {Duzhong Zhang and
                  Xiancheng Wen and
                  Chao Yan and
                  Taiyong Li},
  title        = {An image encryption algorithm based on joint RNA-level permutation
                  and substitution},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {15},
  pages        = {23401--23426},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-14255-3},
  doi          = {10.1007/S11042-022-14255-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhangWYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhuZL23a,
  author       = {Shuqin Zhu and
                  Congxu Zhu and
                  Xiujuan Li},
  title        = {An efficient chosen-plaintext attack and improvement on an image encryption
                  algorithm based on cyclicshift and multiple chaotic map},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {15},
  pages        = {22835--22852},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-023-14630-8},
  doi          = {10.1007/S11042-023-14630-8},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhuZL23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nhm/LiQDS23,
  author       = {Jin Li and
                  Jinzheng Qu and
                  Xibo Duan and
                  Xiaoning Su},
  title        = {An image encryption algorithm based on heat flow cryptosystems},
  journal      = {Networks Heterog. Media},
  volume       = {18},
  number       = {3},
  pages        = {1260--1287},
  year         = {2023},
  url          = {https://doi.org/10.3934/nhm.2023055},
  doi          = {10.3934/NHM.2023055},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nhm/LiQDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AljreesKSS23,
  author       = {Turki Aljrees and
                  Ankit Kumar and
                  Kamred Udham Singh and
                  Teekam Singh},
  title        = {Enhancing IoT Security through a Green and Sustainable Federated Learning
                  Platform: Leveraging Efficient Encryption and the Quondam Signature
                  Algorithm},
  journal      = {Sensors},
  volume       = {23},
  number       = {19},
  pages        = {8090},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23198090},
  doi          = {10.3390/S23198090},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AljreesKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/AlghamdiM23,
  author       = {Yousef Alghamdi and
                  Arslan Munir},
  title        = {An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {6},
  pages        = {713},
  year         = {2023},
  url          = {https://doi.org/10.1007/s42979-023-02172-7},
  doi          = {10.1007/S42979-023-02172-7},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sncs/AlghamdiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/NatiqRBMF23,
  author       = {Hayder Natiq and
                  Animesh Roy and
                  Santo Banerjee and
                  A. P. Misra and
                  N. A. A. Fataf},
  title        = {Enhancing chaos in multistability regions of Duffing map for an image
                  encryption algorithm},
  journal      = {Soft Comput.},
  volume       = {27},
  number       = {24},
  pages        = {19025--19043},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00500-023-08170-4},
  doi          = {10.1007/S00500-023-08170-4},
  timestamp    = {Sat, 18 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/NatiqRBMF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasI/LiGSC23,
  author       = {Shih{-}Yu Li and
                  Yanwen Gai and
                  Kai{-}Chung Shih and
                  Chin{-}Sheng Chen},
  title        = {An Efficient Image Encryption Algorithm Based on Innovative {DES}
                  Structure and Hyperchaotic Keys},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {70},
  number       = {10},
  pages        = {4103--4111},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCSI.2023.3296693},
  doi          = {10.1109/TCSI.2023.3296693},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasI/LiGSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vc/WangC23,
  author       = {Xingyuan Wang and
                  Shengnan Chen},
  title        = {An image encryption algorithm based on pixel bit operation and nonlinear
                  chaotic system},
  journal      = {Vis. Comput.},
  volume       = {39},
  number       = {7},
  pages        = {3123--3144},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00371-022-02517-y},
  doi          = {10.1007/S00371-022-02517-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vc/WangC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/MaoAZ23,
  author       = {Jiarong Mao and
                  Yuting An and
                  Xiaoyi Zhou},
  title        = {A Visually Meaningful Image Encryption Algorithm with Attention Mechanism
                  and Artificial Bee Colony Optimization},
  booktitle    = {Asia Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} {ASC} 2023, Taipei, Taiwan, October
                  31 - Nov. 3, 2023},
  pages        = {462--467},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/APSIPAASC58517.2023.10317534},
  doi          = {10.1109/APSIPAASC58517.2023.10317534},
  timestamp    = {Sat, 02 Dec 2023 14:05:45 +0100},
  biburl       = {https://dblp.org/rec/conf/apsipa/MaoAZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cqpc/GnatyukONPH23,
  author       = {Sergiy Gnatyuk and
                  Andrew Okhrimenko and
                  Denys Navrotskyi and
                  Dmytro Proskurin and
                  Bohdan Horbakha},
  editor       = {Volodymyr Sokolov and
                  Vasyl Ustimenko and
                  Mariya Nazarkevych},
  title        = {Dataset of Cryptographic Algorithms for {UAV} Image Encryption based
                  on Artificial Neural Networks (short paper)},
  booktitle    = {Proceedings of the Workshop on Classic, Quantum, and Post-Quantum
                  Cryptography {(CQPC} 2023) co-located with International Conference
                  on Problems of Infocommunications. Science and Technology {(PICST}
                  2023), Kyiv, Ukraine, August 1, 2023 (online)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3504},
  pages        = {63--71},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3504/short3.pdf},
  timestamp    = {Fri, 08 Dec 2023 14:24:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cqpc/GnatyukONPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eenergy/ForsgrenBVM23,
  author       = {Henrik Forsgren and
                  Rickard Br{\"{a}}nnvall and
                  Mattias Vesterlund and
                  Tor Bj{\"{o}}rn Minde},
  title        = {Homomorphic Encryption Enables Data and Algorithm Confidentiality
                  for Remote Monitoring and Control: An Application to Data Center Systems},
  booktitle    = {Companion Proceedings of the 14th {ACM} International Conference on
                  Future Energy Systems, e-Energy 2023, Orlando, FL, USA, June 20-23,
                  2023},
  pages        = {85--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3599733.3600254},
  doi          = {10.1145/3599733.3600254},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eenergy/ForsgrenBVM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/CK23,
  author       = {Naveen Rahite C and
                  Manoj Senthil K},
  title        = {An In-Depth Review of Blowfish Encryption Algorithm: Security, Performance,
                  and Application},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10307323},
  doi          = {10.1109/ICCCNT56998.2023.10307323},
  timestamp    = {Thu, 30 Nov 2023 16:40:53 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/CK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/Karageorgopoulou23,
  author       = {Angeliki Karageorgopoulou and
                  Vasileios Tsoukas and
                  Georgios P. Spathoulas and
                  Athanasios Kakarountas and
                  Maria G. Koziri},
  title        = {Porting the Paillier Algorithm for Homomorphic Encryption on Portable
                  Devices},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2023,
                  Las Vegas, NV, USA, January 6-8, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCE56470.2023.10043586},
  doi          = {10.1109/ICCE56470.2023.10043586},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccel/Karageorgopoulou23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/Peesapaty23,
  author       = {Sree Harsha Prada Peesapaty},
  title        = {{KILLS-1:} An Analysis on the Present Security Trends and Proposal
                  of a Multilingual Encryption Algorithm},
  booktitle    = {{IEEE} International Carnahan Conference on Security Technology, {ICCST}
                  2023, Pune, India, October 11-15, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCST59048.2023.10474269},
  doi          = {10.1109/ICCST59048.2023.10474269},
  timestamp    = {Tue, 16 Apr 2024 14:15:02 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/Peesapaty23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitjo/MakkiA23,
  author       = {Qasem H. Makki and
                  Ayman M. Abdalla},
  title        = {An Image Encryption Algorithm Based on XOR, Flipping, Expansion Permutation
                  and Shifting},
  booktitle    = {International Conference on Information Technology, {ICIT} 2023, Amman,
                  Jordan, August 9-10, 2023},
  pages        = {700--704},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICIT58056.2023.10225920},
  doi          = {10.1109/ICIT58056.2023.10225920},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitjo/MakkiA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycsee/JinLX23,
  author       = {Anan Jin and
                  Xiang Li and
                  Qingzhi Xiong},
  editor       = {Zhiwen Yu and
                  Qilong Han and
                  Hongzhi Wang and
                  Bin Guo and
                  Xiaokang Zhou and
                  Xianhua Song and
                  Zeguang Lu},
  title        = {Security Compressed Sensing Image Encryption Algorithm Based on Elliptic
                  Curve},
  booktitle    = {Data Science - 9th International Conference of Pioneering Computer
                  Scientists, Engineers and Educators, {ICPCSEE} 2023, Harbin, China,
                  September 22-24, 2023, Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {1879},
  pages        = {350--360},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-5968-6\_25},
  doi          = {10.1007/978-981-99-5968-6\_25},
  timestamp    = {Tue, 23 Apr 2024 16:53:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icycsee/JinLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/BadrFA23,
  author       = {Aymen Mudheher Badr and
                  Lamia Chaari Fourati and
                  Samiha Ayed},
  title        = {An Improved {GIFT} Lightweight Encryption Algorithm to Protect Medical
                  Data In IoT},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2023, Gammarth,
                  Tunisia, July 9-12, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISCC58397.2023.10218067},
  doi          = {10.1109/ISCC58397.2023.10218067},
  timestamp    = {Wed, 06 Sep 2023 08:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/BadrFA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/niss/KattassRJAJB23,
  author       = {Mourad Kattass and
                  Hicham Rrghout and
                  Abdellatif Jarjar and
                  Abdellah Abid and
                  Mariem Jarjar and
                  Abdelhamid Benazzi},
  title        = {An Efficient Image Encryption Algorithm using Chaotic S-boxes of Pseudo-random
                  Size},
  booktitle    = {Proceedings of the 6th International Conference on Networking, Intelligent
                  Systems {\&} Security, Larache, Morocco, May 24-26, 2023},
  pages        = {32:1--32:6},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607720.3607754},
  doi          = {10.1145/3607720.3607754},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/niss/KattassRJAJB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-01923,
  author       = {Dominic Gold and
                  Koray Karabina and
                  Francis C. Motta},
  title        = {An Algorithm for Persistent Homology Computation Using Homomorphic
                  Encryption},
  journal      = {CoRR},
  volume       = {abs/2307.01923},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.01923},
  doi          = {10.48550/ARXIV.2307.01923},
  eprinttype    = {arXiv},
  eprint       = {2307.01923},
  timestamp    = {Mon, 10 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-01923.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldKM23,
  author       = {Dominic Gold and
                  Koray Karabina and
                  Francis C. Motta},
  title        = {An Algorithm for Persistent Homology Computation Using Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1048},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1048},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiHSWZ22,
  author       = {Haixiao Li and
                  Yinan Hu and
                  Ziming Shi and
                  Bin Wang and
                  Pan Zheng},
  title        = {An Image Encryption Algorithm Based on Improved Lifting-Like Structure
                  and Cross-Plane Zigzag Transform},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {82305--82318},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3194730},
  doi          = {10.1109/ACCESS.2022.3194730},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiHSWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangK22,
  author       = {Jihye Yang and
                  Kee Sung Kim},
  title        = {An Efficient Update Algorithm for Mutable Order-Preserving Encryption},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {102009--102018},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3208958},
  doi          = {10.1109/ACCESS.2022.3208958},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/KumarVB22,
  author       = {C. Madan Kumar and
                  R. Vidhya and
                  M. Brindha},
  title        = {An efficient chaos based image encryption algorithm using enhanced
                  thorp shuffle and chaotic convolution function},
  journal      = {Appl. Intell.},
  volume       = {52},
  number       = {3},
  pages        = {2556--2585},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10489-021-02508-x},
  doi          = {10.1007/S10489-021-02508-X},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/KumarVB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/ZhengZ22a,
  author       = {Jiming Zheng and
                  Qingxia Zeng},
  title        = {An image encryption algorithm using a dynamic S-box and chaotic maps},
  journal      = {Appl. Intell.},
  volume       = {52},
  number       = {13},
  pages        = {15703--15717},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10489-022-03174-3},
  doi          = {10.1007/S10489-022-03174-3},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/ZhengZ22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/Al-KhasawnehUSK22,
  author       = {Mahmoud Ahmad Al{-}Khasawneh and
                  Irfan Uddin and
                  Syed Atif Ali Shah and
                  Ahmad M. Khasawneh and
                  Laith Mohammad Abualigah and
                  Marwan Mahmoud},
  title        = {An improved chaotic image encryption algorithm using Hadoop-based
                  MapReduce framework for massive remote sensed images in parallel IoT
                  applications},
  journal      = {Clust. Comput.},
  volume       = {25},
  number       = {2},
  pages        = {999--1013},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10586-021-03466-2},
  doi          = {10.1007/S10586-021-03466-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/Al-KhasawnehUSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computation/KapalovaSAD22,
  author       = {Nursulu Kapalova and
                  Kairat Sakan and
                  Kunbolat Algazy and
                  Dilmukhanbet Dyusenbayev},
  title        = {Development and Study of an Encryption Algorithm},
  journal      = {Comput.},
  volume       = {10},
  number       = {11},
  pages        = {198},
  year         = {2022},
  url          = {https://doi.org/10.3390/computation10110198},
  doi          = {10.3390/COMPUTATION10110198},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computation/KapalovaSAD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/AbusukhonMA22,
  author       = {Ahmad Abusukhon and
                  Zeyad Mohammad and
                  Ali Al{-}Thaher},
  title        = {An authenticated, secure, and mutable multiple-session-keys protocol
                  based on elliptic curve cryptography and text-to-image encryption
                  algorithm},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {34},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/cpe.6649},
  doi          = {10.1002/CPE.6649},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/AbusukhonMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/FanLZLL22,
  author       = {Haiju Fan and
                  Heng Lu and
                  Chenjiu Zhang and
                  Ming Li and
                  Yanfang Liu},
  title        = {Cryptanalysis of an Image Encryption Algorithm Based on Random Walk
                  and Hyperchaotic Systems},
  journal      = {Entropy},
  volume       = {24},
  number       = {1},
  pages        = {40},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24010040},
  doi          = {10.3390/E24010040},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/FanLZLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/LiuLFLWM22,
  author       = {Guangzhe Liu and
                  Wei Li and
                  Xingkui Fan and
                  Zhuang Li and
                  Yuxuan Wang and
                  Hongyang Ma},
  title        = {An Image Encryption Algorithm Based on Discrete-Time Alternating Quantum
                  Walk and Advanced Encryption Standard},
  journal      = {Entropy},
  volume       = {24},
  number       = {5},
  pages        = {608},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24050608},
  doi          = {10.3390/E24050608},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/LiuLFLWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/MengLDSJ22,
  author       = {Xin Meng and
                  Jinqing Li and
                  Xiaoqiang Di and
                  Yaohui Sheng and
                  Donghua Jiang},
  title        = {An Encryption Algorithm for Region of Interest in Medical {DICOM}
                  Based on One-Dimensional e{\(\lambda\)}-cos-cot Map},
  journal      = {Entropy},
  volume       = {24},
  number       = {7},
  pages        = {901},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24070901},
  doi          = {10.3390/E24070901},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/MengLDSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ShengLDLX22,
  author       = {Yaohui Sheng and
                  Jinqing Li and
                  Xiaoqiang Di and
                  Xusheng Li and
                  Rui Xu},
  title        = {An Image Encryption Algorithm Based on Complex Network Scrambling
                  and Multi-Directional Diffusion},
  journal      = {Entropy},
  volume       = {24},
  number       = {9},
  pages        = {1247},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24091247},
  doi          = {10.3390/E24091247},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/ShengLDLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/SongSZW22,
  author       = {Xiaomeng Song and
                  Mengna Shi and
                  Yanqi Zhou and
                  Erfu Wang},
  title        = {An Image Compression Encryption Algorithm Based on Chaos and {ZUC}
                  Stream Cipher},
  journal      = {Entropy},
  volume       = {24},
  number       = {5},
  pages        = {742},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24050742},
  doi          = {10.3390/E24050742},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/SongSZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhangCC22,
  author       = {Chengrui Zhang and
                  Junxin Chen and
                  Dongming Chen},
  title        = {Cryptanalysis of an Image Encryption Algorithm Based on a 2D Hyperchaotic
                  Map},
  journal      = {Entropy},
  volume       = {24},
  number       = {11},
  pages        = {1551},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24111551},
  doi          = {10.3390/E24111551},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhangCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhengB22,
  author       = {Jiming Zheng and
                  Tianyu Bao},
  title        = {An Image Encryption Algorithm Using Cascade Chaotic Map and S-Box},
  journal      = {Entropy},
  volume       = {24},
  number       = {12},
  pages        = {1827},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24121827},
  doi          = {10.3390/E24121827},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhengB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/LiMCB22,
  author       = {Xuejun Li and
                  Jun Mou and
                  Yinghong Cao and
                  Santo Banerjee},
  title        = {An Optical Image Encryption Algorithm Based on a Fractional-Order
                  Laser Hyperchaotic System},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {32},
  number       = {3},
  pages        = {2250035:1--2250035:25},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0218127422500353},
  doi          = {10.1142/S0218127422500353},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijbc/LiMCB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/ParvazYB22,
  author       = {Reza Parvaz and
                  Yavar Khedmati Yengejeh and
                  Yousef Behroo},
  title        = {A New 4D Chaos System with an Encryption Algorithm for Color and Grayscale
                  Images},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {32},
  number       = {14},
  pages        = {2250214:1--2250214:25},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0218127422502145},
  doi          = {10.1142/S0218127422502145},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbc/ParvazYB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/ZhangWZHZ22,
  author       = {Wei Zhang and
                  Shuwen Wang and
                  Guangdong Zhu and
                  Weijie Han and
                  Zhiliang Zhu},
  title        = {An Image Encryption Algorithm Based on an Epidemic Spreading Model},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {32},
  number       = {10},
  pages        = {2250142:1--2250142:19},
  year         = {2022},
  url          = {https://doi.org/10.1142/S0218127422501425},
  doi          = {10.1142/S0218127422501425},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbc/ZhangWZHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/AhmadAAAAZA22,
  author       = {Musheer Ahmad and
                  Shafali Agarwal and
                  Ahmed Alkhayyat and
                  Adi Alhudhaif and
                  Fayadh Alenezi and
                  Amjad Hussain Zahid and
                  Nojood O. Aljehane},
  title        = {An image encryption algorithm based on new generalized fusion fractal
                  structure},
  journal      = {Inf. Sci.},
  volume       = {592},
  pages        = {1--20},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.01.042},
  doi          = {10.1016/J.INS.2022.01.042},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/AhmadAAAAZA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangLJ22,
  author       = {Xingyuan Wang and
                  Cheng Liu and
                  Donghua Jiang},
  title        = {An efficient double-image encryption and hiding algorithm using a
                  newly designed chaotic system and parallel compressive sensing},
  journal      = {Inf. Sci.},
  volume       = {610},
  pages        = {300--325},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.08.002},
  doi          = {10.1016/J.INS.2022.08.002},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/AnandkumarK22,
  author       = {Ramakrishnan Anandkumar and
                  Ramanujam Kalpana},
  title        = {A Fibonacci p-code traversing and unified chaotic map-based image
                  encryption algorithm},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {13},
  number       = {8},
  pages        = {3713--3727},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12652-021-03659-y},
  doi          = {10.1007/S12652-021-03659-Y},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/AnandkumarK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/SammetaP22,
  author       = {Naresh Sammeta and
                  Latha Parthiban},
  title        = {An optimal elliptic curve cryptography based encryption algorithm
                  for blockchain-enabled medical image transmission},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {43},
  number       = {6},
  pages        = {8275--8287},
  year         = {2022},
  url          = {https://doi.org/10.3233/JIFS-211216},
  doi          = {10.3233/JIFS-211216},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/SammetaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/GaoMBCXC22,
  author       = {Xinyu Gao and
                  Jun Mou and
                  Santo Banerjee and
                  Yinghong Cao and
                  Li Xiong and
                  Xiaoyang Chen},
  title        = {An effective multiple-image encryption algorithm based on 3D cube
                  and hyperchaotic map},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {4},
  pages        = {1535--1551},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2022.01.017},
  doi          = {10.1016/J.JKSUCI.2022.01.017},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/GaoMBCXC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/IsmailM22,
  author       = {Nur Hidayah Mohammad Ismail and
                  Md Yushalify Misro},
  title        = {An improved image encryption algorithm based on B{\'{e}}zier
                  coefficients matrix},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {10 Part {B}},
  pages        = {10056--10067},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2022.10.005},
  doi          = {10.1016/J.JKSUCI.2022.10.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/IsmailM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/HadjadjSABK22,
  author       = {Mahieddine Anouar Hadjadj and
                  Said Sadoudi and
                  Mohamed Salah Azzaz and
                  Hichem Bendecheche and
                  Redouane Kaibou},
  title        = {A new hardware architecture of lightweight and efficient real-time
                  video chaos-based encryption algorithm},
  journal      = {J. Real Time Image Process.},
  volume       = {19},
  number       = {6},
  pages        = {1049--1062},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11554-022-01244-w},
  doi          = {10.1007/S11554-022-01244-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jrtip/HadjadjSABK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/FangJYWZ22,
  author       = {Jie Fang and
                  Minghao Jiang and
                  Nannan Yin and
                  Da Wei and
                  Yin Zhang},
  title        = {An image block encryption algorithm based on hyperchaotic system and
                  {DNA} encoding},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {12},
  pages        = {17245--17262},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-022-12604-w},
  doi          = {10.1007/S11042-022-12604-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/FangJYWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HuangCZZY22,
  author       = {Yibo Huang and
                  Tengfei Chen and
                  Qiu{-}yu Zhang and
                  Yuan Zhang and
                  Shaohui Yan},
  title        = {Encrypted speech perceptual hashing authentication algorithm based
                  on improved 2D-Henon encryption and harmonic product spectrum},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {18},
  pages        = {25829--25852},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-022-12746-x},
  doi          = {10.1007/S11042-022-12746-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HuangCZZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/LiangQZ22,
  author       = {Zhongyue Liang and
                  Qiuxia Qin and
                  Changjun Zhou},
  title        = {An image encryption algorithm based on Fibonacci Q-matrix and genetic
                  algorithm},
  journal      = {Neural Comput. Appl.},
  volume       = {34},
  number       = {21},
  pages        = {19313--19341},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00521-022-07493-x},
  doi          = {10.1007/S00521-022-07493-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/LiangQZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/FengZLZSSL22,
  author       = {Yanyan Feng and
                  Jian Zhou and
                  Jie Li and
                  Wei Zhao and
                  Jinjing Shi and
                  Ronghua Shi and
                  Wei Li},
  title        = {{SKC-CCCO:} an encryption algorithm for quantum group signature},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {9},
  pages        = {328},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03664-w},
  doi          = {10.1007/S11128-022-03664-W},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/FengZLZSSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/LuoOLCZ22,
  author       = {Yuling Luo and
                  Xue Ouyang and
                  Junxiu Liu and
                  Lvchen Cao and
                  Yanli Zou},
  title        = {An image encryption scheme based on particle swarm optimization algorithm
                  and hyperchaotic system},
  journal      = {Soft Comput.},
  volume       = {26},
  number       = {11},
  pages        = {5409--5435},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00500-021-06554-y},
  doi          = {10.1007/S00500-021-06554-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/LuoOLCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/Yang22a,
  author       = {Na Yang},
  title        = {An identity-based encryption online/offline {(IBOOE)} algorithm for
                  securing wireless sensor networks},
  journal      = {Wirel. Networks},
  volume       = {28},
  number       = {8},
  pages        = {3493--3502},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11276-022-03026-5},
  doi          = {10.1007/S11276-022-03026-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/Yang22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ElkamchouchiAA22,
  author       = {Hassan M. Elkamchouchi and
                  Rosemarie Anton and
                  Yasmine Abouelseoud},
  title        = {New Encryption Algorithm for Secure Image Transmission Through Open
                  Network},
  journal      = {Wirel. Pers. Commun.},
  volume       = {125},
  number       = {1},
  pages        = {45--62},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-022-09540-1},
  doi          = {10.1007/S11277-022-09540-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ElkamchouchiAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aipr2/BuX22,
  author       = {Wei Bu and
                  Shucui Xie},
  title        = {An Efficient Image Encryption Algorithm Based on Hyperchaotic and
                  Two Times of Scrambling Diffusion},
  booktitle    = {Proceedings of the 5th International Conference on Artificial Intelligence
                  and Pattern Recognition, {AIPR} 2022, Xiamen, China, September 23-25,
                  2022},
  pages        = {562--571},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3573942.3574063},
  doi          = {10.1145/3573942.3574063},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aipr2/BuX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/WangCZC22,
  author       = {Chunping Wang and
                  Jiahui Chen and
                  Xiaoli Zhang and
                  Hongbing Cheng},
  title        = {An Efficient Fully Homomorphic Encryption Sorting Algorithm Using
                  Addition Over {TFHE}},
  booktitle    = {28th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2022, Nanjing, China, January 10-12, 2023},
  pages        = {226--233},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICPADS56603.2022.00037},
  doi          = {10.1109/ICPADS56603.2022.00037},
  timestamp    = {Thu, 06 Apr 2023 14:52:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/WangCZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/radioelektronika/OravecOA22,
  author       = {Jakub Oravec and
                  Lubos Ovsen{\'{\i}}k and
                  Samuel Andrejc{\'{\i}}k},
  title        = {An Image Encryption Algorithm with an Efficient Quantization Scheme},
  booktitle    = {32nd International Conference Radioelektronika, {RADIOELEKTRONIKA}
                  2022, Kosice, Slovakia, April 21-22, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/RADIOELEKTRONIKA54537.2022.9764931},
  doi          = {10.1109/RADIOELEKTRONIKA54537.2022.9764931},
  timestamp    = {Fri, 27 May 2022 13:55:45 +0200},
  biburl       = {https://dblp.org/rec/conf/radioelektronika/OravecOA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PoniszewskaMarandaP22,
  author       = {Aneta Poniszewska{-}Maranda and
                  Kacper Pradzynski},
  title        = {Code-based encryption algorithms for generating and verifying digital
                  signature},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {465--472},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00071},
  doi          = {10.1109/TRUSTCOM56396.2022.00071},
  timestamp    = {Mon, 27 Mar 2023 16:44:39 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PoniszewskaMarandaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-06774,
  author       = {Chengqing Li and
                  Xianhui Shen and
                  Sheng Liu},
  title        = {Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex
                  Logistic Map},
  journal      = {CoRR},
  volume       = {abs/2208.06774},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.06774},
  doi          = {10.48550/ARXIV.2208.06774},
  eprinttype    = {arXiv},
  eprint       = {2208.06774},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-06774.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ElghandourSEK21,
  author       = {Aesha N. Elghandour and
                  Ahmed M. Salah and
                  Yasser A. Elmasry and
                  Abdelrahman A. Karawia},
  title        = {An Image Encryption Algorithm Based on Bisection Method and One-Dimensional
                  Piecewise Chaotic Map},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {43411--43421},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3065810},
  doi          = {10.1109/ACCESS.2021.3065810},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ElghandourSEK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuCXMY21,
  author       = {Haiying Hu and
                  Yinghong Cao and
                  Ji Xu and
                  Chenguang Ma and
                  Huizhen Yan},
  title        = {An Image Compression and Encryption Algorithm Based on the Fractional-Order
                  Simplest Chaotic Circuit},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {22141--22155},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3054842},
  doi          = {10.1109/ACCESS.2021.3054842},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuCXMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangJALW21,
  author       = {Wei Huang and
                  Donghua Jiang and
                  Yisheng An and
                  Lidong Liu and
                  Xingyuan Wang},
  title        = {A Novel Double-Image Encryption Algorithm Based on Rossler Hyperchaotic
                  System and Compressive Sensing},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {41704--41716},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3065453},
  doi          = {10.1109/ACCESS.2021.3065453},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HuangJALW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/connection/JiZSHL21,
  author       = {Honghan Ji and
                  Hongjie Zhang and
                  Lisong Shao and
                  Debiao He and
                  Min Luo},
  title        = {An efficient attribute-based encryption scheme based on {SM9} encryption
                  algorithm for dispatching and control cloud},
  journal      = {Connect. Sci.},
  volume       = {33},
  number       = {4},
  pages        = {1094--1115},
  year         = {2021},
  url          = {https://doi.org/10.1080/09540091.2020.1858757},
  doi          = {10.1080/09540091.2020.1858757},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/connection/JiZSHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/SusiloTY21,
  author       = {Willy Susilo and
                  Joseph Tonien and
                  Guomin Yang},
  title        = {Divide and capture: An improved cryptanalysis of the encryption standard
                  algorithm {RSA}},
  journal      = {Comput. Stand. Interfaces},
  volume       = {74},
  pages        = {103470},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.csi.2020.103470},
  doi          = {10.1016/J.CSI.2020.103470},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/SusiloTY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/OravecOP21,
  author       = {Jakub Oravec and
                  Lubos Ovsen{\'{\i}}k and
                  J{\'{a}}n Papaj},
  title        = {An Image Encryption Algorithm Using Logistic Map with Plaintext-Related
                  Parameter Values},
  journal      = {Entropy},
  volume       = {23},
  number       = {11},
  pages        = {1373},
  year         = {2021},
  url          = {https://doi.org/10.3390/e23111373},
  doi          = {10.3390/E23111373},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/OravecOP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhuZ21a,
  author       = {Shuqin Zhu and
                  Congxu Zhu},
  title        = {An Efficient Chosen-Plaintext Attack on an Image Fusion Encryption
                  Algorithm Based on {DNA} Operation and Hyperchaos},
  journal      = {Entropy},
  volume       = {23},
  number       = {7},
  pages        = {804},
  year         = {2021},
  url          = {https://doi.org/10.3390/e23070804},
  doi          = {10.3390/E23070804},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhuZ21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/OravecOP21,
  author       = {Jakub Oravec and
                  Lubos Ovsen{\'{\i}}k and
                  J{\'{a}}n Papaj},
  title        = {An image encryption algorithm with a plaintext-related quantisation
                  scheme},
  journal      = {{IET} Image Process.},
  volume       = {15},
  number       = {9},
  pages        = {2039--2055},
  year         = {2021},
  url          = {https://doi.org/10.1049/ipr2.12174},
  doi          = {10.1049/IPR2.12174},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/OravecOP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KatukC21,
  author       = {Norliza Katuk and
                  Ikenna Rene Chiadighikaobi},
  title        = {An Enhanced Block Pre-processing of {PRESENT} Algorithm for Fingerprint
                  Template Encryption in the Internet of Things Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.17762/ijcnis.v13i3.5101},
  doi          = {10.17762/IJCNIS.V13I3.5101},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KatukC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KatukC21a,
  author       = {Norliza Katuk and
                  Ikenna Rene Chiadighikaobi},
  title        = {An Enhanced Block Pre-processing of {PRESENT} Algorithm for Fingerprint
                  Template Encryption in the Internet of Things Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {13},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.54039/ijcnis.v13i3.5101},
  doi          = {10.54039/IJCNIS.V13I3.5101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KatukC21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SonAT21,
  author       = {Le Dinh Son and
                  Tran Van An and
                  Nguyen Ngoc Thuy},
  title        = {Improving the asymmetric encryption algorithm based on genetic algorithm,
                  application in online information transmission},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {13},
  number       = {6},
  pages        = {612--629},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJESDF.2021.118543},
  doi          = {10.1504/IJESDF.2021.118543},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SonAT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangZ21,
  author       = {Xingyuan Wang and
                  Maozhen Zhang},
  title        = {An image encryption algorithm based on new chaos and diffusion values
                  of a truth table},
  journal      = {Inf. Sci.},
  volume       = {579},
  pages        = {128--149},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2021.07.096},
  doi          = {10.1016/J.INS.2021.07.096},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/BashierJ21,
  author       = {Eihab Bashier and
                  Taoufik Ben Jabeur},
  title        = {An efficient secure image encryption algorithm based on total shuffling,
                  integer chaotic maps and median filter},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {46--77},
  year         = {2021},
  url          = {https://doi.org/10.22667/JISIS.2021.05.31.046},
  doi          = {10.22667/JISIS.2021.05.31.046},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/BashierJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/ZhangHZ21,
  author       = {Shuai Zhang and
                  Liqun Huang and
                  Mingxu Zhu},
  title        = {Joint Encryption Scheme Based on the Chaotic {DCT} Matrix and {SLM}
                  Algorithm in an {OFDM-PON} System},
  journal      = {Mob. Inf. Syst.},
  volume       = {2021},
  pages        = {8840664:1--8840664:9},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8840664},
  doi          = {10.1155/2021/8840664},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/ZhangHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/Al-MaadeedHAM21,
  author       = {Temadher Alassiry Al{-}Maadeed and
                  Iqtadar Hussain and
                  Amir Anees and
                  Muhammad Tahir Mustafa},
  title        = {A image encryption algorithm based on chaotic Lorenz system and novel
                  primitive polynomial S-boxes},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {16},
  pages        = {24801--24822},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-021-10695-5},
  doi          = {10.1007/S11042-021-10695-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/Al-MaadeedHAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/BhattiYYLNMZ21,
  author       = {Uzair Aslam Bhatti and
                  Linwang Yuan and
                  Zhaoyuan Yu and
                  Jingbing Li and
                  Saqib Ali Nawaz and
                  Anum Mehmood and
                  Kun Zhang},
  title        = {New watermarking algorithm utilizing quaternion Fourier transform
                  with advanced scrambling and secure encryption},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {9},
  pages        = {13367--13387},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-020-10257-1},
  doi          = {10.1007/S11042-020-10257-1},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/BhattiYYLNMZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/DouL21,
  author       = {Yuqiang Dou and
                  Ming Li},
  title        = {An image encryption algorithm based on a novel 1D chaotic map and
                  compressive sensing},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {16},
  pages        = {24437--24454},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-021-10850-y},
  doi          = {10.1007/S11042-021-10850-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/DouL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/El-KhamyM21,
  author       = {Said E. El{-}Khamy and
                  Amira G. Mohamed},
  title        = {An efficient DNA-inspired image encryption algorithm based on hyper-chaotic
                  maps and wavelet fusion},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {15},
  pages        = {23319--23335},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-021-10527-6},
  doi          = {10.1007/S11042-021-10527-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/El-KhamyM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HafsaSMM21,
  author       = {Amal Hafsa and
                  Anissa Sghaier and
                  Jihene Malek and
                  Mohsen Machhout},
  title        = {Image encryption method based on improved {ECC} and modified {AES}
                  algorithm},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {13},
  pages        = {19769--19801},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-021-10700-x},
  doi          = {10.1007/S11042-021-10700-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HafsaSMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WangXA21,
  author       = {Xingyuan Wang and
                  Wenhua Xue and
                  Jubai An},
  title        = {Image encryption algorithm based on {LDCML} and {DNA} coding sequence},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {1},
  pages        = {591--614},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-020-09688-7},
  doi          = {10.1007/S11042-020-09688-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/WangXA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhangHZY21,
  author       = {Wei Zhang and
                  Weijie Han and
                  Zhiliang Zhu and
                  Hai Yu},
  title        = {An ultrahigh-resolution image encryption algorithm using random super-pixel
                  strategy},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {24},
  pages        = {33429--33454},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-021-11096-4},
  doi          = {10.1007/S11042-021-11096-4},
  timestamp    = {Mon, 01 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhangHZY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LinL21,
  author       = {Riguang Lin and
                  Sheng Li},
  title        = {An Image Encryption Scheme Based on Lorenz Hyperchaotic System and
                  {RSA} Algorithm},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5586959:1--5586959:18},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5586959},
  doi          = {10.1155/2021/5586959},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LinL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tds/LinX21,
  author       = {Chuan Lin and
                  Xinpeng Xu},
  title        = {An Electronic Bill Encryption Algorithm Based on Multiple Watermark
                  Encryption},
  journal      = {Traitement du Signal},
  volume       = {38},
  number       = {1},
  pages        = {127--133},
  year         = {2021},
  url          = {https://doi.org/10.18280/ts.380113},
  doi          = {10.18280/TS.380113},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tds/LinX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/TanCHGL21,
  author       = {Weihang Tan and
                  Benjamin M. Case and
                  Gengran Hu and
                  Shuhong Gao and
                  Yingjie Lao},
  title        = {An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping
                  Algorithm in a Fully Homomorphic Encryption Scheme},
  journal      = {J. Signal Process. Syst.},
  volume       = {93},
  number       = {6},
  pages        = {643--656},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11265-020-01608-0},
  doi          = {10.1007/S11265-020-01608-0},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/TanCHGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/GuptaGKSKS21,
  author       = {Manish Gupta and
                  Kamlesh Kumar Gupta and
                  Mohammad Reza Khosravi and
                  Piyush Kumar Shukla and
                  Sandeep Kautish and
                  Achyut Shankar},
  title        = {An Intelligent Session Key-Based Hybrid Lightweight Image Encryption
                  Algorithm Using Logistic-Tent Map and Crossover Operator for Internet
                  of Multimedia Things},
  journal      = {Wirel. Pers. Commun.},
  volume       = {121},
  number       = {3},
  pages        = {1857--1878},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11277-021-08742-3},
  doi          = {10.1007/S11277-021-08742-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/GuptaGKSKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdiot2/AzzabyASK21,
  author       = {Fouzia El Azzaby and
                  Nabil El Akkad and
                  Khalid Sabour and
                  Samir Kabbaj},
  editor       = {Mohamed Lazaar and
                  Claude Duvallet and
                  Abdellah Touhafi and
                  Mohammed Al Achhab},
  title        = {An {RGB} Image Encryption Algorithm Based on Clifford Attractors with
                  a Bilinear Transformation},
  booktitle    = {BDIoT'21: Proceedings of the 5th International Conference on Big Data
                  and Internet of Things, Rabat, Morocco, March 17-18, 2021},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {489},
  pages        = {116--127},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-07969-6\_9},
  doi          = {10.1007/978-3-031-07969-6\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bdiot2/AzzabyASK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai2/DincaA021,
  author       = {Alexandru Dinca and
                  Nicoleta Angelescu and
                  Dan Popescu},
  title        = {Web Data Management Platform Integrating Encryption Algorithms},
  booktitle    = {13th International Conference on Electronics, Computers and Artificial
                  Intelligence, {ECAI} 2021, Pitesti, Romania, July 1-3, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ECAI52376.2021.9515036},
  doi          = {10.1109/ECAI52376.2021.9515036},
  timestamp    = {Fri, 01 Apr 2022 11:05:28 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai2/DincaA021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icct/SongSZW21,
  author       = {Xiaomeng Song and
                  Mengna Shi and
                  Yanqi Zhou and
                  Erfu Wang},
  title        = {An Block Image Encryption Algorithm Based on Reversible Cellular Automata},
  booktitle    = {21st International Conference on Communication Technology, {ICCT}
                  2021, Tianjin, China, October 13-16, 2021},
  pages        = {1167--1172},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCT52962.2021.9658087},
  doi          = {10.1109/ICCT52962.2021.9658087},
  timestamp    = {Tue, 11 Jan 2022 10:02:53 +0100},
  biburl       = {https://dblp.org/rec/conf/icct/SongSZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icig/TangBDGH21,
  author       = {Jianchao Tang and
                  Liyong Bao and
                  Hongwei Ding and
                  Zheng Guan and
                  Min He},
  editor       = {Yuxin Peng and
                  Shi{-}Min Hu and
                  Moncef Gabbouj and
                  Kun Zhou and
                  Michael Elad and
                  Kun Xu},
  title        = {An Improved Digital Image Encryption Algorithm Based on Sine Compound
                  Chaotic System},
  booktitle    = {Image and Graphics - 11th International Conference, {ICIG} 2021, Haikou,
                  China, August 6-8, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12888},
  pages        = {676--687},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-87355-4\_56},
  doi          = {10.1007/978-3-030-87355-4\_56},
  timestamp    = {Wed, 16 Mar 2022 23:55:43 +0100},
  biburl       = {https://dblp.org/rec/conf/icig/TangBDGH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/AlibrahimL21a,
  author       = {Hussain Alibrahim and
                  Simone A. Ludwig},
  title        = {Image Encryption Algorithm based on Particle Swarm Optimization and
                  Chaos Logistic Map},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2021,
                  Orlando, FL, USA, December 5-7, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SSCI50451.2021.9659975},
  doi          = {10.1109/SSCI50451.2021.9659975},
  timestamp    = {Thu, 03 Feb 2022 09:28:31 +0100},
  biburl       = {https://dblp.org/rec/conf/ssci/AlibrahimL21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChiritaSSS21,
  author       = {Madalina Chirita and
                  Alexandru{-}Mihai Stroie and
                  Andrei{-}Daniel Safta and
                  Emil Simion},
  title        = {A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm
                  Improvements and S-Box Customization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/102},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChiritaSSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaoTHGZ21,
  title        = {{IIBE:} An Improved Identity-Based Encryption Algorithm for {WSN}
                  Security},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {8527068:1--8527068:8},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1155/2021/8527068},
  doi          = {10.1155/2021/8527068},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/CaoTHGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BhattiYLNMZY20,
  author       = {Uzair Aslam Bhatti and
                  Zhaoyuan Yu and
                  Jingbing Li and
                  Saqib Ali Nawaz and
                  Anum Mehmood and
                  Kun Zhang and
                  Linwang Yuan},
  title        = {Hybrid Watermarking Algorithm Using Clifford Algebra With Arnold Scrambling
                  and Chaotic Encryption},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {76386--76398},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2988298},
  doi          = {10.1109/ACCESS.2020.2988298},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BhattiYLNMZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DouL20,
  author       = {Yuqiang Dou and
                  Ming Li},
  title        = {An Image Encryption Algorithm Based on Compressive Sensing and {M}
                  Sequence},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {220646--220657},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3043240},
  doi          = {10.1109/ACCESS.2020.3043240},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DouL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoJZXW20,
  author       = {Yuan Guo and
                  Shiwei Jing and
                  Yanyan Zhou and
                  Xin Xu and
                  Liansuo Wei},
  title        = {An Image Encryption Algorithm Based on Logistic-Fibonacci Cascade
                  Chaos and 3D Bit Scrambling},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {9896--9912},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2963717},
  doi          = {10.1109/ACCESS.2019.2963717},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GuoJZXW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuJAG20,
  author       = {Lidong Liu and
                  Donghua Jiang and
                  Tingyu An and
                  Yifan Guan},
  title        = {A Plaintext-Related Dynamical Image Encryption Algorithm Based on
                  Permutation-Combination-Diffusion Architecture},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {62785--62799},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2983716},
  doi          = {10.1109/ACCESS.2020.2983716},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiuJAG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MuhammadO20,
  author       = {Zahir Muhammed Ziad Muhammad and
                  Fatih {\"{O}}zkaynak},
  title        = {An Image Encryption Algorithm Based on Chaotic Selection of Robust
                  Cryptographic Primitives},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {56581--56589},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2982827},
  doi          = {10.1109/ACCESS.2020.2982827},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MuhammadO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangS20a,
  author       = {Xingyuan Wang and
                  Yining Su},
  title        = {An Audio Encryption Algorithm Based on {DNA} Coding and Chaotic System},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {9260--9270},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2963329},
  doi          = {10.1109/ACCESS.2019.2963329},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangS20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangWXWW20,
  author       = {Hao Zhang and
                  Xiaoqing Wang and
                  Hongwei Xie and
                  Chunpeng Wang and
                  Xingyuan Wang},
  title        = {An Efficient and Secure Image Encryption Algorithm Based on Non- Adjacent
                  Coupled Maps},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {122104--122120},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3006513},
  doi          = {10.1109/ACCESS.2020.3006513},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangWXWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhangWHYZ20,
  author       = {Wei Zhang and
                  Shuwen Wang and
                  Weijie Han and
                  Hai Yu and
                  Zhiliang Zhu},
  title        = {An Image Encryption Algorithm Based on Random Hamiltonian Path},
  journal      = {Entropy},
  volume       = {22},
  number       = {1},
  pages        = {73},
  year         = {2020},
  url          = {https://doi.org/10.3390/e22010073},
  doi          = {10.3390/E22010073},
  timestamp    = {Mon, 01 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhangWHYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/XuSW20,
  author       = {Cong Xu and
                  Jingru Sun and
                  Chunhua Wang},
  title        = {An Image Encryption Algorithm Based on Random Walk and Hyperchaotic
                  Systems},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {30},
  number       = {4},
  pages        = {2050060:1--2050060:16},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0218127420500601},
  doi          = {10.1142/S0218127420500601},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbc/XuSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/YeJWPH20,
  author       = {Guodong Ye and
                  Kaixin Jiao and
                  Huishan Wu and
                  Chen Pan and
                  Xiaoling Huang},
  title        = {An Asymmetric Image Encryption Algorithm Based on a Fractional-Order
                  Chaotic System and the {RSA} Public-Key Cryptosystem},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {30},
  number       = {15},
  pages        = {2050233:1--2050233:17},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0218127420502338},
  doi          = {10.1142/S0218127420502338},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbc/YeJWPH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LiDYL20,
  author       = {Hao Li and
                  Lianbing Deng and
                  Cheng Yang and
                  Jianbo Liu},
  title        = {An enhanced media ciphertext-policy attribute-based encryption algorithm
                  on media cloud},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {16},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1177/1550147720908196},
  doi          = {10.1177/1550147720908196},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LiDYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MengYZLS20,
  author       = {Lei Meng and
                  Shoulin Yin and
                  Chu Zhao and
                  Hang Li and
                  Yang Sun},
  title        = {An Improved Image Encryption Algorithm Based on Chaotic Mapping and
                  Discrete Wavelet Transform Domain},
  journal      = {Int. J. Netw. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {155--160},
  year         = {2020},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p155-160.pdf},
  timestamp    = {Wed, 18 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MengYZLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmip/KrishnanJR20,
  author       = {K. Sundara Krishnan and
                  B. Jaison and
                  S. P. Raja},
  title        = {An efficient novel color image encryption algorithm based on 3D L{\"{u}}
                  chaotic dynamical system and {SHA-512}},
  journal      = {Int. J. Wavelets Multiresolution Inf. Process.},
  volume       = {18},
  number       = {5},
  pages        = {2050042:1--2050042:30},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0219691320500423},
  doi          = {10.1142/S0219691320500423},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmip/KrishnanJR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaLO20,
  author       = {Yunling Ma and
                  Chengqing Li and
                  Bo Ou},
  title        = {Cryptanalysis of an image block encryption algorithm based on chaotic
                  maps},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102566},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102566},
  doi          = {10.1016/J.JISA.2020.102566},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MaLO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/GuptaSK20,
  author       = {Anvita Gupta and
                  Dilbag Singh and
                  Manjit Kaur},
  title        = {An efficient image encryption using non-dominated sorting genetic
                  algorithm-III based 4-D chaotic maps},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {1309--1324},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12652-019-01493-x},
  doi          = {10.1007/S12652-019-01493-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/GuptaSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/ChenYYLMW20,
  author       = {Liping Chen and
                  Hao Yin and
                  Liguo Yuan and
                  Ant{\'{o}}nio M. Lopes and
                  J. A. Tenreiro Machado and
                  Ranchao Wu},
  title        = {A novel color image encryption algorithm based on a fractional-order
                  discrete chaotic neural network and {DNA} sequence operations},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {21},
  number       = {6},
  pages        = {866--879},
  year         = {2020},
  url          = {https://doi.org/10.1631/FITEE.1900709},
  doi          = {10.1631/FITEE.1900709},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/ChenYYLMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/MadaniT20,
  author       = {Mahdi Madani and
                  Camel Tanougast},
  title        = {{FPGA} implementation of an optimized {A5/3} encryption algorithm},
  journal      = {Microprocess. Microsystems},
  volume       = {78},
  pages        = {103212},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.micpro.2020.103212},
  doi          = {10.1016/J.MICPRO.2020.103212},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/MadaniT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HarissNS20,
  author       = {Khalil Hariss and
                  Hassan Noura and
                  Abed Ellatif Samhat},
  title        = {An efficient fully homomorphic symmetric encryption algorithm},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {17-18},
  pages        = {12139--12164},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-019-08511-2},
  doi          = {10.1007/S11042-019-08511-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HarissNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MalikGD20,
  author       = {Anjali Malik and
                  Shailender Gupta and
                  Sangeeta Dhal},
  title        = {Analysis of traditional and modern image encryption algorithms under
                  realistic ambience},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {37-38},
  pages        = {27941--27993},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-09279-6},
  doi          = {10.1007/S11042-020-09279-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/MalikGD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhengLZ20,
  author       = {Jiming Zheng and
                  Zheng Luo and
                  Qingxia Zeng},
  title        = {An efficient image encryption algorithm based on multi chaotic system
                  and random {DAN} coding},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {39-40},
  pages        = {29901--29921},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-09454-9},
  doi          = {10.1007/S11042-020-09454-9},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhengLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhuGLC20,
  author       = {Changjiang Zhu and
                  Zhihua Gan and
                  Yang Lu and
                  Xiuli Chai},
  title        = {An image encryption algorithm based on 3-D {DNA} level permutation
                  and substitution scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {11-12},
  pages        = {7227--7258},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-019-08226-4},
  doi          = {10.1007/S11042-019-08226-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhuGLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/ChenSH20,
  author       = {Chen Chen and
                  Kehui Sun and
                  Shaobo He},
  title        = {An improved image encryption algorithm with finite computing precision},
  journal      = {Signal Process.},
  volume       = {168},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sigpro.2019.107340},
  doi          = {10.1016/J.SIGPRO.2019.107340},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/ChenSH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sis/KhanHSISI20,
  author       = {Abdul Hannan Khan and
                  Syed Anwer Hasnain and
                  Shahan Yamin Siddiqui and
                  Muhammad Sohail Irshad and
                  Muhammad Sajid and
                  Shahid Iqbal},
  title        = {Analytical Method to Compute the Cloud Computing Data Security Issues
                  by Using Encryption Algorithms},
  journal      = {{EAI} Endorsed Trans. Scalable Inf. Syst.},
  volume       = {7},
  number       = {28},
  pages        = {e3},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.13-7-2018.164555},
  doi          = {10.4108/EAI.13-7-2018.164555},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sis/KhanHSISI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiWWLZL20,
  author       = {Zhaohui Li and
                  Yiqing Wang and
                  Zhi Wang and
                  Zheli Liu and
                  Jian Zhang and
                  Min Li},
  title        = {Reversible Information Hiding Algorithm Based on Multikey Encryption},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {8847559:1--8847559:10},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8847559},
  doi          = {10.1155/2020/8847559},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/LiWWLZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/GeethaPTL20,
  author       = {R. Geetha and
                  T. Padmavathy and
                  T. Thilagam and
                  A. Lallithasree},
  title        = {Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption
                  Algorithm},
  journal      = {Wirel. Pers. Commun.},
  volume       = {112},
  number       = {1},
  pages        = {21--36},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11277-019-07013-6},
  doi          = {10.1007/S11277-019-07013-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/GeethaPTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/AlipourPBAH20,
  author       = {Amir Alipour and
                  Athanasios Papadimitriou and
                  Vincent Beroulle and
                  Ehsan Aerabi and
                  David H{\'{e}}ly},
  title        = {On the Performance of Non-Profiled Differential Deep Learning Attacks
                  against an {AES} Encryption Algorithm Protected using a Correlated
                  Noise Generation based Hiding Countermeasure},
  booktitle    = {2020 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020},
  pages        = {614--617},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/DATE48585.2020.9116387},
  doi          = {10.23919/DATE48585.2020.9116387},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/AlipourPBAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewdts/SafaryanRCPLA20,
  author       = {Olga A. Safaryan and
                  Evgenia V. Roshchina and
                  Larissa V. Cherckesova and
                  Elena V. Pinevich and
                  Andrey G. Lobodenko and
                  Boris A. Akishin},
  title        = {Cryptographic Algorithm Implementation for Data Encryption in {DBMS}
                  {MS} {SQL} Server},
  booktitle    = {{IEEE} East-West Design {\&} Test Symposium, {EWDTS} 2020, Varna,
                  Bulgaria, September 4-7, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EWDTS50664.2020.9224775},
  doi          = {10.1109/EWDTS50664.2020.9224775},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ewdts/SafaryanRCPLA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/WangYTHZ20,
  author       = {Danghui Wang and
                  Chen Yue and
                  Ze Tian and
                  Ru Han and
                  Lu Zhang},
  editor       = {Meikang Qiu},
  title        = {An Energy-Efficient {AES} Encryption Algorithm Based on Memristor
                  Switch},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 20th International
                  Conference, {ICA3PP} 2020, New York City, NY, USA, October 2-4, 2020,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12454},
  pages        = {639--653},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60248-2\_44},
  doi          = {10.1007/978-3-030-60248-2\_44},
  timestamp    = {Thu, 01 Oct 2020 14:14:33 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/WangYTHZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbet/YumangDLML20,
  author       = {Analyn Niere Yumang and
                  Ericson D. Dimaunahan and
                  Jose B. Lazaro and
                  Joshua Luis T. Marinas and
                  John Emmanuel G. Logatoc},
  title        = {Encryption and Decryption of Vital Signs Information through a Symmetric
                  based Cryptography Algorithm},
  booktitle    = {Proceedings of the 10th International Conference on Biomedical Engineering
                  and Technology, {ICBET} 2020, Tokyo, Japan, September 15-18, 2020},
  pages        = {218--223},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3397391.3397423},
  doi          = {10.1145/3397391.3397423},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icbet/YumangDLML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/AvK20,
  author       = {Nandini Av and
                  Nilita Anil Kumar},
  title        = {Image Encryption Using Genetic Algorithm and Bit-Slice Rotation},
  booktitle    = {11th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCCNT49239.2020.9225312},
  doi          = {10.1109/ICCCNT49239.2020.9225312},
  timestamp    = {Thu, 22 Oct 2020 13:44:41 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/AvK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/BhamidipatiA20,
  author       = {Kishore Bhamidipati and
                  Soorya Annadurai},
  editor       = {Brij B. Gupta and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Dharma P. Agrawal and
                  Deepak Gupta},
  title        = {Permutation-Substitution Based Image Encryption Algorithms Using Pseudorandom
                  Number Generators},
  booktitle    = {Handbook of Computer Networks and Cyber Security, Principles and Paradigms},
  pages        = {825--848},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-22277-2\_33},
  doi          = {10.1007/978-3-030-22277-2\_33},
  timestamp    = {Sun, 12 Nov 2023 02:22:31 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/BhamidipatiA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-12264,
  author       = {Iqtadar Hussain and
                  Amir Anees and
                  Temadher Alassiry Al{-}Maadeed and
                  M. T. Mustafa},
  title        = {A novel encryption algorithm using multiple semifield S-boxes based
                  on permutation of symmetric group},
  journal      = {CoRR},
  volume       = {abs/2004.12264},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.12264},
  eprinttype    = {arXiv},
  eprint       = {2004.12264},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-12264.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-11847,
  author       = {Temadher Alassiry Al{-}Maadeed and
                  Iqtadar Hussain and
                  Amir Anees and
                  M. T. Mustafa},
  title        = {An image encryption algorithm based on chaotic Lorenz system and novel
                  primitive polynomial S-boxes},
  journal      = {CoRR},
  volume       = {abs/2006.11847},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.11847},
  eprinttype    = {arXiv},
  eprint       = {2006.11847},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-11847.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-00575,
  author       = {Unnikrishnan Menon and
                  Anirudh Rajiv Menon and
                  Atharva Hudlikar},
  title        = {A Novel Chaotic System for Text Encryption Optimized with Genetic
                  Algorithm},
  journal      = {CoRR},
  volume       = {abs/2011.00575},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.00575},
  eprinttype    = {arXiv},
  eprint       = {2011.00575},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-00575.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ManLDB19,
  author       = {Zhenlong Man and
                  Jinqing Li and
                  Xiaoqiang Di and
                  Ou Bai},
  title        = {An Image Segmentation Encryption Algorithm Based on Hybrid Chaotic
                  System},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {103047--103058},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2931732},
  doi          = {10.1109/ACCESS.2019.2931732},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ManLDB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangZ19g,
  author       = {Xingyuan Wang and
                  Hongyu Zhao},
  title        = {Cracking and Improvement of an Image Encryption Algorithm Based on
                  Bit-Level Permutation and Chaotic System},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {112836--112847},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2935017},
  doi          = {10.1109/ACCESS.2019.2935017},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangZ19g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csjm/MoldovyanMM19,
  author       = {Alexander A. Moldovyan and
                  Dmitriy N. Moldovyan and
                  Nikolay A. Moldovyan},
  title        = {Post-quantum commutative encryption algorithm},
  journal      = {Comput. Sci. J. Moldova},
  volume       = {27},
  number       = {3},
  pages        = {299--317},
  year         = {2019},
  url          = {http://www.math.md/publications/csjm/issues/v27-n3/13004/},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csjm/MoldovyanMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/AskarKAA19,
  author       = {Sameh S. Askar and
                  Abdelrahman A. Karawia and
                  Abdulrahman Al{-}Khedhairi and
                  Fatemah S. Al{-}Ammar},
  title        = {An Algorithm of Image Encryption Using Logistic and Two-Dimensional
                  Chaotic Economic Maps},
  journal      = {Entropy},
  volume       = {21},
  number       = {1},
  pages        = {44},
  year         = {2019},
  url          = {https://doi.org/10.3390/e21010044},
  doi          = {10.3390/E21010044},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/AskarKAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/KhanHMBU19,
  author       = {Sajid Khan and
                  Lansheng Han and
                  Ghulam Mudassir and
                  Guehguih Bachira and
                  Hidayat Ullah},
  title        = {3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and {SM-DNA}},
  journal      = {Entropy},
  volume       = {21},
  number       = {11},
  pages        = {1075},
  year         = {2019},
  url          = {https://doi.org/10.3390/e21111075},
  doi          = {10.3390/E21111075},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/KhanHMBU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/WenYL19,
  author       = {Heping Wen and
                  Simin Yu and
                  Jinhu L{\"{u}}},
  title        = {Breaking an Image Encryption Algorithm Based on {DNA} Encoding and
                  Spatiotemporal Chaos},
  journal      = {Entropy},
  volume       = {21},
  number       = {3},
  pages        = {246},
  year         = {2019},
  url          = {https://doi.org/10.3390/e21030246},
  doi          = {10.3390/E21030246},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/WenYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/AnL19,
  author       = {Feng{-}Ping An and
                  Jun{-}e Liu},
  title        = {Image Encryption Algorithm Based on Adaptive Wavelet Chaos},
  journal      = {J. Sensors},
  volume       = {2019},
  pages        = {2768121:1--2768121:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2768121},
  doi          = {10.1155/2019/2768121},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/AnL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/NkandeuT19,
  author       = {Yannick Pascal Kamdeu Nkandeu and
                  Alain Tiedeu},
  title        = {An image encryption algorithm based on substitution technique and
                  chaos mixing},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {8},
  pages        = {10013--10034},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6612-2},
  doi          = {10.1007/S11042-018-6612-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/NkandeuT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhangH19,
  author       = {Jian Zhang and
                  Da Huo},
  title        = {Image encryption algorithm based on quantum chaotic map and {DNA}
                  coding},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {11},
  pages        = {15605--15621},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6973-6},
  doi          = {10.1007/S11042-018-6973-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhangH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/GhadirliNE19,
  author       = {Hossein Movafegh Ghadirli and
                  Ali Nodehi and
                  Rasul Enayatifar},
  title        = {An overview of encryption algorithms in color images},
  journal      = {Signal Process.},
  volume       = {164},
  pages        = {163--185},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.sigpro.2019.06.010},
  doi          = {10.1016/J.SIGPRO.2019.06.010},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/GhadirliNE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tds/HerbadjiDBHB19,
  author       = {Djamel Herbadji and
                  Nadir Derouiche and
                  A{\"{\i}}ssa Belmeguena{\"{\i}} and
                  Abderrahmane Herbadji and
                  Selma Boumerdassi},
  title        = {A Tweakable Image Encryption Algorithm Using an Improved Logistic
                  Chaotic Map},
  journal      = {Traitement du Signal},
  volume       = {36},
  number       = {5},
  pages        = {407--417},
  year         = {2019},
  url          = {https://doi.org/10.18280/ts.360505},
  doi          = {10.18280/TS.360505},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tds/HerbadjiDBHB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ArabRG19,
  author       = {Alireza Arab and
                  Mohammad Javad Rostami and
                  Behnam Ghavami},
  title        = {An image encryption method based on chaos system and {AES} algorithm},
  journal      = {J. Supercomput.},
  volume       = {75},
  number       = {10},
  pages        = {6663--6682},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11227-019-02878-7},
  doi          = {10.1007/S11227-019-02878-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ArabRG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aces/MurtazaPHX019,
  author       = {Abid Murtaza and
                  Syed Jahanzeb Hussain Pirzada and
                  Muhammad Noman Hasan and
                  Tongge Xu and
                  Jianwei Liu},
  editor       = {Mohammed Anbar and
                  Nibras Abdullah and
                  Selvakumar Manickam},
  title        = {An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite
                  Communication},
  booktitle    = {Advances in Cyber Security - First International Conference, ACeS
                  2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1132},
  pages        = {289--302},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-2693-0\_21},
  doi          = {10.1007/978-981-15-2693-0\_21},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aces/MurtazaPHX019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccoms/VibarMS19,
  author       = {Jayvee Christopher N. Vibar and
                  Ruji P. Medina and
                  Ariel M. Sison},
  title        = {ERC5a - An Enhanced {RC5} Algorithm on Bit Propagation in the Encryption
                  Function},
  booktitle    = {{IEEE} 4th International Conference on Computer and Communication
                  Systems, {ICCCS} 2019, Singapore, February 23-25, 2019},
  pages        = {479--482},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCOMS.2019.8821685},
  doi          = {10.1109/CCOMS.2019.8821685},
  timestamp    = {Sun, 08 Aug 2021 01:40:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ccoms/VibarMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csps/WangLMZ19,
  author       = {Yingli Wang and
                  Haiting Liu and
                  Hongbin Ma and
                  Wei Zhuang},
  editor       = {Qilian Liang and
                  Wei Wang and
                  Xin Liu and
                  Zhenyu Na and
                  Min Jia and
                  Baoju Zhang},
  title        = {An Improved Adversarial Neural Network Encryption Algorithm Against
                  the Chosen-Cipher Text Attack {(CCA)}},
  booktitle    = {Communications, Signal Processing, and Systems - Proceedings of the
                  8th International Conference on Communications, Signal Processing,
                  and Systems, {CSPS} 2019, Urumqi, China, 20-22 July 2019},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {571},
  pages        = {1336--1343},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-13-9409-6\_160},
  doi          = {10.1007/978-981-13-9409-6\_160},
  timestamp    = {Thu, 09 Apr 2020 10:53:46 +0200},
  biburl       = {https://dblp.org/rec/conf/csps/WangLMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcsmart/KovalchukISPLK19,
  author       = {Anatoliy Kovalchuk and
                  Ivan Izonin and
                  Christine Strauss and
                  Mariia Podavalkina and
                  Natalia Lotoshynska and
                  Nataliya Kustra},
  editor       = {Natalia Kryvinska and
                  Ivan Izonin and
                  Michal Gregus and
                  Aneta Poniszewska{-}Maranda and
                  Ivanna Dronyuk},
  title        = {Image Encryption and Decryption Schemes Using Linear and Quadratic
                  Fractal Algorithms and Their Systems},
  booktitle    = {Proceedings of the 1st International Workshop on Digital Content {\&}
                  Smart Multimedia (DCSMart 2019), Lviv, Ukraine, December 23-25, 2019},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2533},
  pages        = {139--150},
  publisher    = {CEUR-WS.org},
  year         = {2019},
  url          = {https://ceur-ws.org/Vol-2533/paper13.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:41 +0100},
  biburl       = {https://dblp.org/rec/conf/dcsmart/KovalchukISPLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccad/ChenFZK19,
  author       = {Huili Chen and
                  Cheng Fu and
                  Jishen Zhao and
                  Farinaz Koushanfar},
  editor       = {David Z. Pan},
  title        = {GenUnlock: An Automated Genetic Algorithm Framework for Unlocking
                  Logic Encryption},
  booktitle    = {Proceedings of the International Conference on Computer-Aided Design,
                  {ICCAD} 2019, Westminster, CO, USA, November 4-7, 2019},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCAD45719.2019.8942134},
  doi          = {10.1109/ICCAD45719.2019.8942134},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccad/ChenFZK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccasa/MoldovyanMP019,
  author       = {Dmitriy N. Moldovyan and
                  Alexander A. Moldovyan and
                  Ngoc Han Phieu and
                  Minh Hieu Nguyen},
  editor       = {Phan Cong Vinh and
                  Abdur Rakib},
  title        = {Post-quantum Commutative Encryption Algorithm},
  booktitle    = {Context-Aware Systems and Applications, and Nature of Computation
                  and Communication - 8th {EAI} International Conference, {ICCASA} 2019,
                  and 5th {EAI} International Conference, {ICTCC} 2019, My Tho City,
                  Vietnam, November 28-29, 2019, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {298},
  pages        = {205--214},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34365-1\_16},
  doi          = {10.1007/978-3-030-34365-1\_16},
  timestamp    = {Thu, 02 Feb 2023 17:25:52 +0100},
  biburl       = {https://dblp.org/rec/conf/iccasa/MoldovyanMP019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/AkandeAAKAO19,
  author       = {Noah Oluwatobi Akande and
                  Christiana Oluwakemi Abikoye and
                  Marion Olubunmi Adebiyi and
                  Anthonia Aderonke Kayode and
                  Adekanmi Adeyinka Adegun and
                  Roseline Oluwaseun Ogundokun},
  editor       = {Sanjay Misra and
                  Osvaldo Gervasi and
                  Beniamino Murgante and
                  Elena N. Stankova and
                  Vladimir Korkhov and
                  Carmelo Maria Torre and
                  Ana Maria A. C. Rocha and
                  David Taniar and
                  Bernady O. Apduhan and
                  Eufemia Tarantino},
  title        = {Electronic Medical Information Encryption Using Modified Blowfish
                  Algorithm},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2019 - 19th International
                  Conference, Saint Petersburg, Russia, July 1-4, 2019, Proceedings,
                  Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11623},
  pages        = {166--179},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24308-1\_14},
  doi          = {10.1007/978-3-030-24308-1\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/AkandeAAKAO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/MatsunagaY19,
  author       = {Yusuke Matsunaga and
                  Masayoshi Yoshimura},
  editor       = {Dimitris Gizopoulos and
                  Dan Alexandrescu and
                  Panagiota Papavramidou and
                  Michail Maniatakos},
  title        = {An Efficient SAT-Attack Algorithm Against Logic Encryption},
  booktitle    = {25th {IEEE} International Symposium on On-Line Testing and Robust
                  System Design, {IOLTS} 2019, Rhodes, Greece, July 1-3, 2019},
  pages        = {44--47},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IOLTS.2019.8854466},
  doi          = {10.1109/IOLTS.2019.8854466},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iolts/MatsunagaY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itnac/LiMA19,
  author       = {Xue Jun Li and
                  Maode Ma and
                  Narayanan Arjun},
  title        = {An Encryption Algorithm to Prevent Domain Name System Cache Poisoning
                  Attacks},
  booktitle    = {29th International Telecommunication Networks and Applications Conference,
                  {ITNAC} 2019, Auckland, New Zealand, November 27-29, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ITNAC46935.2019.9078019},
  doi          = {10.1109/ITNAC46935.2019.9078019},
  timestamp    = {Mon, 04 May 2020 16:58:48 +0200},
  biburl       = {https://dblp.org/rec/conf/itnac/LiMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sips/TanAAAL19,
  author       = {Weihang Tan and
                  Aengran Au and
                  Benjamin Aase and
                  Shuhong Aao and
                  Yingjie Lao},
  title        = {An Efficient Polynomial Multiplier Architecture for the Bootstrapping
                  Algorithm in a Fully Homomorphic Encryption Scheme},
  booktitle    = {2019 {IEEE} International Workshop on Signal Processing Systems, SiPS
                  2019, Nanjing, China, October 20-23, 2019},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SiPS47522.2019.9020592},
  doi          = {10.1109/SIPS47522.2019.9020592},
  timestamp    = {Thu, 12 Mar 2020 18:11:04 +0100},
  biburl       = {https://dblp.org/rec/conf/sips/TanAAAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-12915,
  author       = {Yunling Ma and
                  Chengqing Li},
  title        = {Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic
                  Maps},
  journal      = {CoRR},
  volume       = {abs/1912.12915},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.12915},
  eprinttype    = {arXiv},
  eprint       = {1912.12915},
  timestamp    = {Sat, 04 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-12915.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kaminsky19a,
  author       = {Alan Kaminsky},
  title        = {Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human
                  Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kaminsky19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangZZ18,
  author       = {Xingyuan Wang and
                  Xiaoqiang Zhu and
                  Yingqian Zhang},
  title        = {An Image Encryption Algorithm Based on Josephus Traversing and Mixed
                  Chaotic Map},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {23733--23746},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2805847},
  doi          = {10.1109/ACCESS.2018.2805847},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/WangSPRWJLWWCJ18,
  author       = {Wei Wang and
                  Miaomiao Si and
                  Yu Pang and
                  Peng Ran and
                  Huiqian Wang and
                  Xiaoming Jiang and
                  Yu Liu and
                  Jun Wu and
                  Wei Wu and
                  Naveen K. Chilamkurti and
                  Gwanggil Jeon},
  title        = {An encryption algorithm based on combined chaos in body area networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {65},
  pages        = {282--291},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compeleceng.2017.07.026},
  doi          = {10.1016/J.COMPELECENG.2017.07.026},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/WangSPRWJLWWCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ChandrasekaranB18,
  author       = {Balaji Chandrasekaran and
                  Ramadoss Balakrishnan},
  title        = {An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy
                  Attribute Based Encryption Scheme in Cloud Environments},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {14},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030014},
  doi          = {10.3390/CRYPTOGRAPHY2030014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ChandrasekaranB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/HuangY18,
  author       = {Xiaoling Huang and
                  Guodong Ye},
  title        = {An Image Encryption Algorithm Based on Time-Delay and Random Insertion},
  journal      = {Entropy},
  volume       = {20},
  number       = {12},
  pages        = {974},
  year         = {2018},
  url          = {https://doi.org/10.3390/e20120974},
  doi          = {10.3390/E20120974},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/HuangY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/LiLLH18,
  author       = {Chengqing Li and
                  Dongdong Lin and
                  Jinhu Lu and
                  Feng Hao},
  title        = {Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking
                  and Electrocardiography},
  journal      = {{IEEE} Multim.},
  volume       = {25},
  number       = {4},
  pages        = {46--56},
  year         = {2018},
  url          = {https://doi.org/10.1109/MMUL.2018.2873472},
  doi          = {10.1109/MMUL.2018.2873472},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeemm/LiLLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcvr/ReddyRB18,
  author       = {M. Purushotham Reddy and
                  B. Venkata Ramana Reddy and
                  Shoba Bindu Chigarepalli},
  title        = {An image encryption algorithm using logarithmic function and Henon-chaotic
                  function},
  journal      = {Int. J. Comput. Vis. Robotics},
  volume       = {8},
  number       = {4},
  pages        = {388--402},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJCVR.2018.093969},
  doi          = {10.1504/IJCVR.2018.093969},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcvr/ReddyRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijksr/Vargas-Vera18,
  author       = {Maria Vargas{-}Vera},
  title        = {Tu-vera: An Encryption Algorithm Using Propositional Logic Calculus},
  journal      = {Int. J. Smart Educ. Urban Soc.},
  volume       = {9},
  number       = {2},
  pages        = {49--59},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJSEUS.2018040105},
  doi          = {10.4018/IJSEUS.2018040105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijksr/Vargas-Vera18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/AhmadAALA18,
  author       = {Musheer Ahmad and
                  Mohammad Zaiyan Alam and
                  Subia Ansari and
                  Dragan Lambic and
                  Hamed D. Al{-}Sharari},
  title        = {Cryptanalysis of an image encryption algorithm based on {PWLCM} and
                  inertial delayed neural network},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {34},
  number       = {3},
  pages        = {1323--1332},
  year         = {2018},
  url          = {https://doi.org/10.3233/JIFS-169428},
  doi          = {10.3233/JIFS-169428},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/AhmadAALA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/MelloX18,
  author       = {Fl{\'{a}}vio Luis de Mello and
                  Jos{\'{e}} A. M. Xex{\'{e}}o},
  title        = {Identifying Encryption Algorithms in {ECB} and {CBC} Modes Using Computational
                  Intelligence},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {24},
  number       = {1},
  pages        = {25--42},
  year         = {2018},
  url          = {http://www.jucs.org/jucs\_24\_1/identifying\_encryption\_algorithms\_in},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/MelloX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HuangY18,
  author       = {Xiaoling Huang and
                  Guodong Ye},
  title        = {An image encryption algorithm based on irregular wave representation},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {2},
  pages        = {2611--2628},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4455-x},
  doi          = {10.1007/S11042-017-4455-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HuangY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuYZC18,
  author       = {Jingyi Liu and
                  Dingding Yang and
                  Hongbo Zhou and
                  Shiqiang Chen},
  title        = {A digital image encryption algorithm based on bit-planes and an improved
                  logistic map},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {8},
  pages        = {10217--10233},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-5406-2},
  doi          = {10.1007/S11042-017-5406-2},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuYZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LuoZLQC18,
  author       = {Yuling Luo and
                  Ronglong Zhou and
                  Junxiu Liu and
                  Senhui Qiu and
                  Yi Cao},
  title        = {An efficient and self-adapting colour-image encryption algorithm based
                  on chaos and interactions among multiple layers},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {20},
  pages        = {26191--26217},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-018-5844-5},
  doi          = {10.1007/S11042-018-5844-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LuoZLQC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhuZ18,
  author       = {Shuqin Zhu and
                  Congxu Zhu},
  title        = {Image encryption algorithm with an avalanche effect based on a six-dimensional
                  discrete chaotic system},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {21},
  pages        = {29119--29142},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-018-6078-2},
  doi          = {10.1007/S11042-018-6078-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhuZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Lara-NinoDM18,
  author       = {Carlos Andres Lara{-}Nino and
                  Arturo Diaz{-}Perez and
                  Miguel Morales{-}Sandoval},
  title        = {Energy and Area Costs of Lightweight Cryptographic Algorithms for
                  Authenticated Encryption in {WSN}},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {5087065:1--5087065:14},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/5087065},
  doi          = {10.1155/2018/5087065},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Lara-NinoDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/ChaiZGHC18,
  author       = {Xiu{-}Li Chai and
                  Xiaoyu Zheng and
                  Zhihua Gan and
                  Daojun Han and
                  Yiran Chen},
  title        = {An image encryption algorithm based on chaotic system and compressive
                  sensing},
  journal      = {Signal Process.},
  volume       = {148},
  pages        = {124--144},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.sigpro.2018.02.007},
  doi          = {10.1016/J.SIGPRO.2018.02.007},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/ChaiZGHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/AhmadSWDBA18,
  author       = {Musheer Ahmad and
                  Eesa A. Alsolami and
                  Xing{-}Yuan Wang and
                  Mohammad Najam Doja and
                  Mirza Mohd. Sufyan Beg and
                  Amer Awad Alzaidi},
  title        = {Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos
                  for a {BAN} System, and Improved Scheme Using {SHA-512} and Hyperchaos},
  journal      = {Symmetry},
  volume       = {10},
  number       = {7},
  pages        = {266},
  year         = {2018},
  url          = {https://doi.org/10.3390/sym10070266},
  doi          = {10.3390/SYM10070266},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/AhmadSWDBA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ZhuWS18,
  author       = {Congxu Zhu and
                  Guojun Wang and
                  Kehui Sun},
  title        = {Cryptanalysis and Improvement on an Image Encryption Algorithm Design
                  Using a Novel Chaos Based S-Box},
  journal      = {Symmetry},
  volume       = {10},
  number       = {9},
  pages        = {399},
  year         = {2018},
  url          = {https://doi.org/10.3390/sym10090399},
  doi          = {10.3390/SYM10090399},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/ZhuWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MiglioreRLTFG18,
  author       = {Vincent Migliore and
                  Maria Mendez Real and
                  Vianney Lapotre and
                  Arnaud Tisserand and
                  Caroline Fontaine and
                  Guy Gogniat},
  title        = {Hardware/Software Co-Design of an Accelerator for {FV} Homomorphic
                  Encryption Scheme Using Karatsuba Algorithm},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {3},
  pages        = {335--347},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2016.2645204},
  doi          = {10.1109/TC.2016.2645204},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/MiglioreRLTFG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bic-ta/CuiWZZ18,
  author       = {Guangzhao Cui and
                  Lingfei Wang and
                  Xuncai Zhang and
                  Zheng Zhou},
  editor       = {Jianyong Qiao and
                  Xinchao Zhao and
                  Linqiang Pan and
                  Xingquan Zuo and
                  Xingyi Zhang and
                  Qingfu Zhang and
                  Shanguo Huang},
  title        = {An Image Encryption Algorithm Based on Dynamic {DNA} Coding and Hyper-chaotic
                  Lorenz System},
  booktitle    = {Bio-inspired Computing: Theories and Applications - 13th International
                  Conference, {BIC-TA} 2018, Beijing, China, November 2-4, 2018, Proceedings,
                  Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {952},
  pages        = {226--238},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-2829-9\_21},
  doi          = {10.1007/978-981-13-2829-9\_21},
  timestamp    = {Tue, 26 Apr 2022 12:02:09 +0200},
  biburl       = {https://dblp.org/rec/conf/bic-ta/CuiWZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bic-ta/ZhangZNWW18,
  author       = {Xuncai Zhang and
                  Zheng Zhou and
                  Ying Niu and
                  Yanfeng Wang and
                  Lingfei Wang},
  editor       = {Jianyong Qiao and
                  Xinchao Zhao and
                  Linqiang Pan and
                  Xingquan Zuo and
                  Xingyi Zhang and
                  Qingfu Zhang and
                  Shanguo Huang},
  title        = {An Image Encryption Algorithm Based on Chaotic System Using {DNA}
                  Sequence Operations},
  booktitle    = {Bio-inspired Computing: Theories and Applications - 13th International
                  Conference, {BIC-TA} 2018, Beijing, China, November 2-4, 2018, Proceedings,
                  Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {952},
  pages        = {213--225},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-2829-9\_20},
  doi          = {10.1007/978-981-13-2829-9\_20},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bic-ta/ZhangZNWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bic-ta/ZhangZZWL18,
  author       = {Xuncai Zhang and
                  Hangyu Zhou and
                  Zheng Zhou and
                  Lingfei Wang and
                  Chao Li},
  editor       = {Jianyong Qiao and
                  Xinchao Zhao and
                  Linqiang Pan and
                  Xingquan Zuo and
                  Xingyi Zhang and
                  Qingfu Zhang and
                  Shanguo Huang},
  title        = {An Image Encryption Algorithm Based on Hyper-chaotic System and Genetic
                  Algorithm},
  booktitle    = {Bio-inspired Computing: Theories and Applications - 13th International
                  Conference, {BIC-TA} 2018, Beijing, China, November 2-4, 2018, Proceedings,
                  Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {952},
  pages        = {466--476},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-2829-9\_43},
  doi          = {10.1007/978-981-13-2829-9\_43},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bic-ta/ZhangZZWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsmp/KovalchukL18,
  author       = {Anatoliy Kovalchuk and
                  Nataliia Lotoshynska},
  title        = {Elements of {RSA} Algorithm and Extra Noising in a Binary Linear-Quadratic
                  Transformations During Encryption and Decryption of Images},
  booktitle    = {Second International Conference on Data Stream Mining {\&} Processing,
                  {DSMP} 2018, Lviv, Ukraine, August 21-25, 2018},
  pages        = {542--544},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSMP.2018.8478471},
  doi          = {10.1109/DSMP.2018.8478471},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsmp/KovalchukL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaip/YeHP18,
  author       = {Guodong Ye and
                  Xiaoling Huang and
                  Chen Pan},
  title        = {An Efficient Image Encryption Algorithm Based on Three-dimensional
                  Chaotic Map},
  booktitle    = {Proceedings of the 2nd International Conference on Advances in Image
                  Processing, {ICAIP} 2018, Chengdu, China, June 16-18, 2018},
  pages        = {78--82},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3239576.3239584},
  doi          = {10.1145/3239576.3239584},
  timestamp    = {Thu, 23 Mar 2023 11:00:28 +0100},
  biburl       = {https://dblp.org/rec/conf/icaip/YeHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LuLXG18,
  author       = {Bin Lu and
                  Fenlin Liu and
                  Ping Xu and
                  Xin Ge},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Analysis and Improvement on an Image Encryption Algorithm Based on
                  Bit Level Permutation},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11065},
  pages        = {506--518},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00012-7\_46},
  doi          = {10.1007/978-3-030-00012-7\_46},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/LuLXG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/BanerjeeP18,
  author       = {Soumi Banerjee and
                  Anita Patil},
  editor       = {Ajith Abraham and
                  Aswani Kumar Cherukuri and
                  Patricia Melin and
                  Niketa Gandhi},
  title        = {{ECC} Based Encryption Algorithm for Lightweight Cryptography},
  booktitle    = {Intelligent Systems Design and Applications - 18th International Conference
                  on Intelligent Systems Design and Applications, {ISDA} 2018, Vellore,
                  India, December 6-8, 2018, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {940},
  pages        = {600--609},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-16657-1\_56},
  doi          = {10.1007/978-3-030-16657-1\_56},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isda/BanerjeeP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-02891,
  author       = {Jissy Ann George and
                  S. Veni and
                  Safeeullah Soomro},
  title        = {Improving Privacy and Trust in Federated Identity Using {SAML} with
                  Hash Based Encryption Algorithm},
  journal      = {CoRR},
  volume       = {abs/1803.02891},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.02891},
  eprinttype    = {arXiv},
  eprint       = {1803.02891},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-02891.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-02647,
  author       = {Osama A. S. Alkishriwo},
  title        = {An Image Encryption Algorithm Based on Chaotic Maps and Discrete Linear
                  Chirp Transform},
  journal      = {CoRR},
  volume       = {abs/1807.02647},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.02647},
  eprinttype    = {arXiv},
  eprint       = {1807.02647},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-02647.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-03692,
  author       = {Xiaowei Li and
                  Ying Wang and
                  Qiong{-}Hua Wang and
                  Yang Liu and
                  Xin Zhou},
  title        = {Modified integral imaging reconstruction and encryption using an improved
                  {SR} reconstruction algorithm},
  journal      = {CoRR},
  volume       = {abs/1809.03692},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.03692},
  eprinttype    = {arXiv},
  eprint       = {1809.03692},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-03692.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YuWXGAZY17,
  author       = {Ruiguo Yu and
                  Jianrong Wang and
                  Tianyi Xu and
                  Jie Gao and
                  Yongli An and
                  Gong Zhang and
                  Mei Yu},
  title        = {Authentication With Block-Chain Algorithm and Text Encryption Protocol
                  in Calculation of Social Network},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {24944--24951},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2767285},
  doi          = {10.1109/ACCESS.2017.2767285},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YuWXGAZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/LiLL17,
  author       = {Chengqing Li and
                  Dongdong Lin and
                  Jinhu Lu},
  title        = {Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits},
  journal      = {{IEEE} Multim.},
  volume       = {24},
  number       = {3},
  pages        = {64--71},
  year         = {2017},
  url          = {https://doi.org/10.1109/MMUL.2017.3051512},
  doi          = {10.1109/MMUL.2017.3051512},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeemm/LiLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbidm/PriyaSJ17,
  author       = {P. Shanmuga Priya and
                  Rajendran Sugumar and
                  Sasidevi Jayaraman},
  title        = {An effective encryption algorithm for multi-keyword-based top-K retrieval
                  on cloud data},
  journal      = {Int. J. Bus. Intell. Data Min.},
  volume       = {12},
  number       = {1},
  pages        = {44--61},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJBIDM.2017.10002867},
  doi          = {10.1504/IJBIDM.2017.10002867},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbidm/PriyaSJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AmiruddinRS17,
  author       = {Amiruddin Amiruddin and
                  Anak Agung Putri Ratna and
                  Riri Fitri Sari},
  title        = {New Key Generation and Encryption Algorithms for Privacy Preservation
                  in Mobile Ad Hoc Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {9},
  number       = {3},
  year         = {2017},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/2307},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AmiruddinRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/YeH17,
  author       = {Guodong Ye and
                  Xiaoling Huang},
  title        = {An efficient symmetric image encryption algorithm based on an intertwining
                  logistic map},
  journal      = {Neurocomputing},
  volume       = {251},
  pages        = {45--53},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.neucom.2017.04.016},
  doi          = {10.1016/J.NEUCOM.2017.04.016},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/YeH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/KhanKAHA17,
  author       = {Jan Sher Khan and
                  Muazzam Ali Khan and
                  Jawad Ahmad and
                  Seong Oun Hwang and
                  Waqas Ahmed},
  title        = {An Improved Image Encryption Scheme Based on a Non-Linear Chaotic
                  Algorithm and Substitution Boxes},
  journal      = {Informatica},
  volume       = {28},
  number       = {4},
  pages        = {629--649},
  year         = {2017},
  url          = {https://content.iospress.com/articles/informatica/inf1160},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/KhanKAHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ZhangW017,
  author       = {Xiao Zhang and
                  Chengqi Wang and
                  Zhiming Zheng},
  title        = {An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive
                  Model and Feedback Mechanism},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {3},
  pages        = {1785--1801},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.03.029},
  doi          = {10.3837/TIIS.2017.03.029},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/ZhangW017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/Murillo-Escobar17,
  author       = {Miguel {\'{A}}ngel Murillo{-}Escobar and
                  Liliana Cardoza{-}Avenda{\~{n}}o and
                  Rosa Martha L{\'{o}}pez{-}Guti{\'{e}}rrez and
                  C{\'{e}}sar Cruz{-}Hern{\'{a}}ndez},
  title        = {A Double Chaotic Layer Encryption Algorithm for Clinical Signals in
                  Telemedicine},
  journal      = {J. Medical Syst.},
  volume       = {41},
  number       = {4},
  pages        = {59:1--59:17},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10916-017-0698-3},
  doi          = {10.1007/S10916-017-0698-3},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/Murillo-Escobar17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/Chai17,
  author       = {Xiu{-}Li Chai},
  title        = {An image encryption algorithm based on bit level Brownian motion and
                  new chaotic systems},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {1},
  pages        = {1159--1175},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-015-3088-1},
  doi          = {10.1007/S11042-015-3088-1},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/Chai17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuM17,
  author       = {Lingfeng Liu and
                  Suoxia Miao},
  title        = {An image encryption algorithm based on Baker map with varying parameter},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {15},
  pages        = {16511--16527},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3925-x},
  doi          = {10.1007/S11042-016-3925-X},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/NorouziM17a,
  author       = {Benyamin Norouzi and
                  Sattar Mirzakuchaki},
  title        = {An image encryption algorithm based on {DNA} sequence operations and
                  cellular neural network},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {11},
  pages        = {13681--13701},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3769-4},
  doi          = {10.1007/S11042-016-3769-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/NorouziM17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ThanhT17,
  author       = {Ta Minh Thanh and
                  Keisuke Tanaka},
  title        = {An image zero-watermarking algorithm based on the encryption of visual
                  map feature with watermark information},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {11},
  pages        = {13455--13471},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3750-2},
  doi          = {10.1007/S11042-016-3750-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ThanhT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WangZZ17,
  author       = {Chengqi Wang and
                  Xiao Zhang and
                  Zhiming Zheng},
  title        = {An efficient image encryption algorithm based on a novel chaotic map},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {22},
  pages        = {24251--24280},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-4102-y},
  doi          = {10.1007/S11042-016-4102-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/WangZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhangNMT17,
  author       = {Xuanping Zhang and
                  Weiguo Nie and
                  Youling Ma and
                  Qinqin Tian},
  title        = {Cryptanalysis and improvement of an image encryption algorithm based
                  on hyper-chaotic system and dynamic S-box},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {14},
  pages        = {15641--15659},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3861-9},
  doi          = {10.1007/S11042-016-3861-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhangNMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/ChaiGYCL17,
  author       = {Xiu{-}Li Chai and
                  Zhihua Gan and
                  Kang Yang and
                  Yiran Chen and
                  Xianxing Liu},
  title        = {An image encryption algorithm based on the memristive hyperchaotic
                  system, cellular automata and {DNA} sequence operations},
  journal      = {Signal Process. Image Commun.},
  volume       = {52},
  pages        = {6--19},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.image.2016.12.007},
  doi          = {10.1016/J.IMAGE.2016.12.007},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spic/ChaiGYCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/AryalIHK17,
  author       = {Anu Aryal and
                  Shoko Imaizumi and
                  Takahiko Horiuchi and
                  Hitoshi Kiya},
  title        = {Integrated algorithm for block-permutation-based encryption with reversible
                  data hiding},
  booktitle    = {2017 Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} {ASC} 2017, Kuala Lumpur, Malaysia,
                  December 12-15, 2017},
  pages        = {203--208},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/APSIPA.2017.8282028},
  doi          = {10.1109/APSIPA.2017.8282028},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsipa/AryalIHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/DiWLCQZ17,
  author       = {Xiaoqiang Di and
                  Yingzheng Wang and
                  Jinqing Li and
                  Ligang Cong and
                  Hui Qi and
                  Yuxin Zhang},
  editor       = {Qingli Li and
                  Lipo Wang and
                  Mei Zhou and
                  Li Sun and
                  Song Qiu and
                  Hongying Liu},
  title        = {An optimized video selective encryption algorithm},
  booktitle    = {10th International Congress on Image and Signal Processing, BioMedical
                  Engineering and Informatics, {CISP-BMEI} 2017, Shanghai, China, October
                  14-16, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CISP-BMEI.2017.8301932},
  doi          = {10.1109/CISP-BMEI.2017.8301932},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/DiWLCQZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/SunLL17,
  author       = {Chao Sun and
                  Li Li and
                  Yuqi Liu},
  editor       = {Jeng{-}Shyang Pan and
                  Pei{-}Wei Tsai and
                  Junzo Watada and
                  Lakhmi C. Jain},
  title        = {An Encryption Algorithm for {ROI} Images},
  booktitle    = {Advances in Intelligent Information Hiding and Multimedia Signal Processing
                  - Proceedings of the Thirteenth International Conference on Intelligent
                  Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2017,
                  August, 12-15, 2017, Matsue, Shimane, Japan, Part {I}},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {81},
  pages        = {440--448},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63856-0\_53},
  doi          = {10.1007/978-3-319-63856-0\_53},
  timestamp    = {Sun, 25 Oct 2020 22:36:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/SunLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-01858,
  author       = {Chengqing Li and
                  Dongdong Lin},
  title        = {Cryptanalyzing an image encryption algorithm based on autoblocking
                  and electrocardiography},
  journal      = {CoRR},
  volume       = {abs/1711.01858},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.01858},
  eprinttype    = {arXiv},
  eprint       = {1711.01858},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-01858.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csjm/MoldovyanMMS16,
  author       = {Nikolay A. Moldovyan and
                  Alexander A. Moldovyan and
                  Dmitriy N. Moldovyan and
                  Victor A. Shcherbacov},
  title        = {Stream Deniable-Encryption Algorithms},
  journal      = {Comput. Sci. J. Moldova},
  volume       = {24},
  number       = {1},
  pages        = {68--82},
  year         = {2016},
  url          = {http://www.math.md/publications/csjm/issues/v24-n1/12094/},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csjm/MoldovyanMMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/Anghelescu16,
  author       = {Petre Anghelescu},
  title        = {{FPGA} implementation of programmable cellular automata encryption
                  algorithm for network communications},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {31},
  number       = {5},
  year         = {2016},
  timestamp    = {Fri, 17 Mar 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/Anghelescu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/YeH16,
  author       = {Guodong Ye and
                  Xiaoling Huang},
  title        = {An Image Encryption Algorithm Based on Autoblocking and Electrocardiography},
  journal      = {{IEEE} Multim.},
  volume       = {23},
  number       = {2},
  pages        = {64--71},
  year         = {2016},
  url          = {https://doi.org/10.1109/MMUL.2015.72},
  doi          = {10.1109/MMUL.2015.72},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeemm/YeH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/GeLLG16,
  author       = {Xin Ge and
                  Bin Lu and
                  Fenlin Liu and
                  Daofu Gong},
  title        = {An Image Encryption Algorithm Based on Information Hiding},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {26},
  number       = {11},
  pages        = {1650192:1--1650192:14},
  year         = {2016},
  url          = {https://doi.org/10.1142/S0218127416501923},
  doi          = {10.1142/S0218127416501923},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbc/GeLLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmip/KumarJ16,
  author       = {Manish Kumar and
                  Kashyap L. S. J. Josyula},
  title        = {An interlaced secure algorithm for {RGB} image encryption in wavelet
                  packet domain},
  journal      = {Int. J. Wavelets Multiresolution Inf. Process.},
  volume       = {14},
  number       = {3},
  pages        = {1650008:1--1650008:14},
  year         = {2016},
  url          = {https://doi.org/10.1142/S0219691316500089},
  doi          = {10.1142/S0219691316500089},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmip/KumarJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/HouariT16,
  author       = {Nawal Sad Houari and
                  Noria Taghezout},
  title        = {A Novel Approach for Integrating Security in Business Rules Modeling
                  Using Agents and an Encryption Algorithm},
  journal      = {J. Inf. Process. Syst.},
  volume       = {12},
  number       = {4},
  pages        = {688--710},
  year         = {2016},
  url          = {https://doi.org/10.3745/JIPS.03.0056},
  doi          = {10.3745/JIPS.03.0056},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jips/HouariT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/Murillo-Escobar16,
  author       = {Miguel {\'{A}}ngel Murillo{-}Escobar and
                  C{\'{e}}sar Cruz{-}Hern{\'{a}}ndez and
                  Fausto Abundiz{-}P{\'{e}}rez and
                  Rosa Martha L{\'{o}}pez{-}Guti{\'{e}}rrez},
  title        = {Implementation of an improved chaotic encryption algorithm for real-time
                  embedded systems by using a 32-bit microcontroller},
  journal      = {Microprocess. Microsystems},
  volume       = {45},
  pages        = {297--309},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.micpro.2016.06.004},
  doi          = {10.1016/J.MICPRO.2016.06.004},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/Murillo-Escobar16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/JainR16,
  author       = {Anchal Jain and
                  Navin Rajpal},
  title        = {A robust image encryption algorithm resistant to attacks using {DNA}
                  and chaotic logistic maps},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {10},
  pages        = {5455--5472},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2515-7},
  doi          = {10.1007/S11042-015-2515-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/JainR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZengLZLW16,
  author       = {Li Zeng and
                  Renren Liu and
                  Leo Yu Zhang and
                  Yuansheng Liu and
                  Kwok{-}Wo Wong},
  title        = {Cryptanalyzing an image encryption algorithm based on scrambling and
                  Vegin{\`{e}}re cipher},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {10},
  pages        = {5439--5453},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2511-y},
  doi          = {10.1007/S11042-015-2511-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZengLZLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/ChoiK16,
  author       = {Jaehak Choi and
                  Youngseop Kim},
  title        = {An improved {LEA} block encryption algorithm to prevent side-channel
                  attack in the IoT system},
  booktitle    = {Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} 2016, Jeju, South Korea, December
                  13-16, 2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/APSIPA.2016.7820845},
  doi          = {10.1109/APSIPA.2016.7820845},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/apsipa/ChoiK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/HousseinAH16,
  author       = {Essam H. Houssein and
                  Mona A. S. Ali and
                  Aboul Ella Hassanien},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {An Image Steganography Algorithm using Haar Discrete Wavelet Transform
                  with Advanced Encryption System},
  booktitle    = {Proceedings of the 2016 Federated Conference on Computer Science and
                  Information Systems, FedCSIS 2016, Gda{\'{n}}sk, Poland, September
                  11-14, 2016},
  series       = {Annals of Computer Science and Information Systems},
  volume       = {8},
  pages        = {641--644},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.15439/2016F521},
  doi          = {10.15439/2016F521},
  timestamp    = {Tue, 23 Apr 2024 09:56:26 +0200},
  biburl       = {https://dblp.org/rec/conf/fedcsis/HousseinAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/NarayanasamyA16,
  author       = {Kanagaraj Narayanasamy and
                  Padmapriya Arumugam},
  editor       = {Nikolaj S. Bj{\o}rner and
                  Sanjiva Prasad and
                  Laxmi Parida},
  title        = {i-TSS: An Image Encryption Algorithm Based on Transposition, Shuffling
                  and Substitution Using Randomly Generated Bitmap Image},
  booktitle    = {Distributed Computing and Internet Technology - 12th International
                  Conference, {ICDCIT} 2016, Bhubaneswar, India, January 15-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9581},
  pages        = {148--156},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-28034-9\_20},
  doi          = {10.1007/978-3-319-28034-9\_20},
  timestamp    = {Thu, 14 Apr 2022 20:26:15 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/NarayanasamyA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/KumarA16,
  author       = {A. D. Senthil Kumar and
                  T. S. Anandhi},
  title        = {Multi image integration and Encryption Algorithm for security applications},
  booktitle    = {{IECON} 2016 - 42nd Annual Conference of the {IEEE} Industrial Electronics
                  Society, Florence, Italy, October 23-26, 2016},
  pages        = {986--991},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IECON.2016.7793265},
  doi          = {10.1109/IECON.2016.7793265},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/KumarA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipas2/NiniZO16,
  author       = {Brahim Nini and
                  Asma Zitouni and
                  Asma Ounzar},
  title        = {Analysis of the use of some statistical measures in deciding about
                  the efficiency of an image encryption algorithm},
  booktitle    = {International Image Processing, Applications and Systems, {IPAS} 2016,
                  Hammamet, Tunisia, November 5-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IPAS.2016.7880130},
  doi          = {10.1109/IPAS.2016.7880130},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ipas2/NiniZO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiL16a,
  author       = {Chengqing Li and
                  Dongdong Lin},
  title        = {Cryptanalysis of an Image Scrambling Encryption Algorithm},
  journal      = {CoRR},
  volume       = {abs/1607.01642},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.01642},
  eprinttype    = {arXiv},
  eprint       = {1607.01642},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LiL16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SinghD16,
  author       = {Kirat Pal Singh and
                  Shiwani Dod},
  title        = {An Efficient Hardware design and Implementation of Advanced Encryption
                  Standard {(AES)} Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {789},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/789},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SinghD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/Murillo-EscobarCALC15,
  author       = {Miguel {\'{A}}ngel Murillo{-}Escobar and
                  C{\'{e}}sar Cruz{-}Hern{\'{a}}ndez and
                  Fausto Abundiz{-}P{\'{e}}rez and
                  Rosa Martha L{\'{o}}pez{-}Guti{\'{e}}rrez and
                  Oscar Ricardo Acosta del Campo},
  title        = {A {RGB} image encryption algorithm based on total plain image characteristics
                  and chaos},
  journal      = {Signal Process.},
  volume       = {109},
  pages        = {119--131},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.sigpro.2014.10.033},
  doi          = {10.1016/J.SIGPRO.2014.10.033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/Murillo-EscobarCALC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai2/Soloi15,
  author       = {Anton Soloi},
  title        = {An encryption algorithm},
  booktitle    = {2015 7th International Conference on Electronics, Computers and Artificial
                  Intelligence (ECAI), Bucharest, Romania, June 25-27, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ECAI.2015.7301252},
  doi          = {10.1109/ECAI.2015.7301252},
  timestamp    = {Fri, 08 Apr 2022 09:38:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai2/Soloi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/Burak15,
  author       = {Dariusz Burak},
  editor       = {Slawomir Koziel and
                  Leifur {\TH}. Leifsson and
                  Michael Lees and
                  Valeria V. Krzhizhanovskaya and
                  Jack J. Dongarra and
                  Peter M. A. Sloot},
  title        = {Parallelization of an Encryption Algorithm Based on a Spatiotemporal
                  Chaotic System and a Chaotic Neural Network},
  booktitle    = {Proceedings of the International Conference on Computational Science,
                  {ICCS} 2015, Computational Science at the Gates of Nature, Reykjav{\'{\i}}k,
                  Iceland, 1-3 June, 2015, 2014},
  series       = {Procedia Computer Science},
  volume       = {51},
  pages        = {2888--2892},
  publisher    = {Elsevier},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.procs.2015.05.453},
  doi          = {10.1016/J.PROCS.2015.05.453},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/Burak15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncvpripg/SinghSR15,
  author       = {Piyush Kumar Singh and
                  Ravi Shankar Singh and
                  Kabindra Nath Rai},
  title        = {An image encryption algorithm based on {XOR} operation with approximation
                  component in wavelet transform},
  booktitle    = {2015 Fifth National Conference on Computer Vision, Pattern Recognition,
                  Image Processing and Graphics (NCVPRIPG), Patna, India, December 16-19,
                  2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NCVPRIPG.2015.7490013},
  doi          = {10.1109/NCVPRIPG.2015.7490013},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ncvpripg/SinghSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rvsp/YangLYKHD15,
  author       = {Zi{-}Heng Yang and
                  Aohan Li and
                  Ling{-}Ling Yu and
                  Shi{-}Jun Kang and
                  Meng{-}Jiang Han and
                  Qun Ding},
  title        = {An Improved {AES} Encryption Algorithm Based on Chaos Theory in Wireless
                  Communication Networks},
  booktitle    = {Third International Conference on Robot, Vision and Signal Processing,
                  {RVSP} 2015, Kaohsiung, Taiwan, November 18-20, 2015},
  pages        = {159--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/RVSP.2015.45},
  doi          = {10.1109/RVSP.2015.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rvsp/YangLYKHD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siu/GuvenogluT15,
  author       = {Erdal G{\"{u}}venoglu and
                  Mehmet Ali Aksoy Tuysuz},
  title        = {An improvement for Knutt/Durstenfeld algorithm based image encryption},
  booktitle    = {2015 23nd Signal Processing and Communications Applications Conference
                  (SIU), Malatya, Turkey, May 16-19, 2015},
  pages        = {1761--1764},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SIU.2015.7130194},
  doi          = {10.1109/SIU.2015.7130194},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/siu/GuvenogluT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChadhaMCJR15,
  author       = {Aman Chadha and
                  Sushmit Mallik and
                  Ankit R. Chadha and
                  Ravdeep Johar and
                  M. Mani Roja},
  title        = {Dual-Layer Video Encryption using {RSA} Algorithm},
  journal      = {CoRR},
  volume       = {abs/1509.04387},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.04387},
  eprinttype    = {arXiv},
  eprint       = {1509.04387},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChadhaMCJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LalSK15,
  author       = {Nidhi Lal and
                  Anurag Prakash Singh and
                  Shishupal Kumar},
  title        = {Modified Trial Division Algorithm Using KNJ-Factorization Method To
                  Factorize {RSA} Public Key Encryption},
  journal      = {CoRR},
  volume       = {abs/1501.02365},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.02365},
  eprinttype    = {arXiv},
  eprint       = {1501.02365},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LalSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cnsns/AneesSA14,
  author       = {Amir Anees and
                  Adil Masood Siddiqui and
                  Fawad Ahmed},
  title        = {Chaotic substitution for highly autocorrelated data in encryption
                  algorithm},
  journal      = {Commun. Nonlinear Sci. Numer. Simul.},
  volume       = {19},
  number       = {9},
  pages        = {3106--3118},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cnsns.2014.02.011},
  doi          = {10.1016/J.CNSNS.2014.02.011},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cnsns/AneesSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cnsns/HuangY14,
  author       = {Xiaoling Huang and
                  Guodong Ye},
  title        = {An efficient self-adaptive model for chaotic image encryption algorithm},
  journal      = {Commun. Nonlinear Sci. Numer. Simul.},
  volume       = {19},
  number       = {12},
  pages        = {4094--4104},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cnsns.2014.04.012},
  doi          = {10.1016/J.CNSNS.2014.04.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cnsns/HuangY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/WangLB14,
  author       = {Xingyuan Wang and
                  Dapeng Luan and
                  Xuemei Bao},
  title        = {Cryptanalysis of an image encryption algorithm using Chebyshev generator},
  journal      = {Digit. Signal Process.},
  volume       = {25},
  pages        = {244--247},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.dsp.2013.10.020},
  doi          = {10.1016/J.DSP.2013.10.020},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/WangLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ShenZZ14,
  author       = {Haojie Shen and
                  Li Zhuo and
                  Yingdi Zhao},
  title        = {An efficient motion reference structure based selective encryption
                  algorithm for {H.264} videos},
  journal      = {{IET} Inf. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {199--206},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0349},
  doi          = {10.1049/IET-IFS.2012.0349},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ShenZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imst/KannammalR14,
  author       = {Kannammal Annadurai and
                  S. Subha Rani},
  title        = {Two level security for medical images using watermarking/encryption
                  algorithms},
  journal      = {Int. J. Imaging Syst. Technol.},
  volume       = {24},
  number       = {1},
  pages        = {111--120},
  year         = {2014},
  url          = {https://doi.org/10.1002/ima.22086},
  doi          = {10.1002/IMA.22086},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imst/KannammalR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HermassiBRB14,
  author       = {Houcemeddine Hermassi and
                  Akram Belazi and
                  Rhouma Rhouma and
                  Safya Belghith},
  title        = {Security analysis of an image encryption algorithm based on a {DNA}
                  addition combining with chaotic maps},
  journal      = {Multim. Tools Appl.},
  volume       = {72},
  number       = {3},
  pages        = {2211--2224},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-013-1533-6},
  doi          = {10.1007/S11042-013-1533-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HermassiBRB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HuangY14,
  author       = {Xiaoling Huang and
                  Guodong Ye},
  title        = {An image encryption algorithm based on hyper-chaos and {DNA} sequence},
  journal      = {Multim. Tools Appl.},
  volume       = {72},
  number       = {1},
  pages        = {57--70},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-012-1331-6},
  doi          = {10.1007/S11042-012-1331-6},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HuangY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuK14,
  author       = {Fuwen Liu and
                  Hartmut K{\"{o}}nig},
  title        = {Puzzle - an efficient, compression independent video encryption algorithm},
  journal      = {Multim. Tools Appl.},
  volume       = {73},
  number       = {2},
  pages        = {715--735},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-012-1185-y},
  doi          = {10.1007/S11042-012-1185-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccomm/Diaconu14,
  author       = {Adrian{-}Viorel Diaconu},
  title        = {An image encryption algorithm with a chaotic dynamical system based
                  Sudoku Grid},
  booktitle    = {10th International Conference on Communications, {COMM} 2014, Bucharest,
                  Romania, May 29-31, 2014},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICComm.2014.6866666},
  doi          = {10.1109/ICCOMM.2014.6866666},
  timestamp    = {Fri, 01 Apr 2022 12:37:24 +0200},
  biburl       = {https://dblp.org/rec/conf/iccomm/Diaconu14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HsiaoL14,
  author       = {Feng{-}Hsiag Hsiao and
                  Guang{-}Wei Liou},
  title        = {Application of Advanced Encryption Standard to Chaotic Synchronization
                  Systems: Using an Improved Genetic Algorithm as Auxiliary},
  booktitle    = {2014 International Conference on {IT} Convergence and Security, 10.1109/ICITCS.2014,
                  Beijing, China, October 28-30, 2014},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITCS.2014.7021740},
  doi          = {10.1109/ICITCS.2014.7021740},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/HsiaoL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfi/FuYMY14,
  author       = {Yong Fu and
                  Xiaowei Yi and
                  Hengtai Ma and
                  Xiaowei Yi},
  title        = {An encryption algorithm of {JPEG2000} streams for supporting ciphertext-based
                  transcoding},
  booktitle    = {International Conference on Multisensor Fusion and Information Integration
                  for Intelligent Systems, {MFI} 2014, Beijing, China, September 28-29,
                  2014},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/MFI.2014.6997647},
  doi          = {10.1109/MFI.2014.6997647},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/mfi/FuYMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZengLZLW14,
  author       = {Li Zeng and
                  Renren Liu and
                  Leo Yu Zhang and
                  Yuansheng Liu and
                  Kwok{-}Wo Wong},
  title        = {Cryptanalyzing an image encryption algorithm based on scrambling and
                  Veginere cipher},
  journal      = {CoRR},
  volume       = {abs/1409.4845},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.4845},
  eprinttype    = {arXiv},
  eprint       = {1409.4845},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZengLZLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cas/AnghelescuII13,
  author       = {Petre Anghelescu and
                  Silviu Ionita and
                  Vasile{-}Gabriel Iana},
  title        = {High-Speed {PCA} Encryption Algorithm using Reconfigurable Computing},
  journal      = {Cybern. Syst.},
  volume       = {44},
  number       = {4},
  pages        = {285--304},
  year         = {2013},
  url          = {https://doi.org/10.1080/01969722.2013.783375},
  doi          = {10.1080/01969722.2013.783375},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cas/AnghelescuII13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/KeLN13,
  author       = {Peng Ke and
                  Yuanxiang Li and
                  Fuchuan Ni},
  title        = {An evolvable cellular automata based data encryption algorithm},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {6},
  number       = {1},
  pages        = {66--71},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJWMC.2013.053036},
  doi          = {10.1504/IJWMC.2013.053036},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/KeLN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/VaralakshmiS13,
  author       = {L. M. Varalakshmi and
                  G. Florence Sudha},
  title        = {An enhanced encryption algorithm for video based on multiple Huffman
                  tables},
  journal      = {Multim. Tools Appl.},
  volume       = {64},
  number       = {3},
  pages        = {717--729},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11042-011-0963-2},
  doi          = {10.1007/S11042-011-0963-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/VaralakshmiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rcs/AcevedoMAM13,
  author       = {Elena Acevedo and
                  {\'{A}}ngel Mart{\'{\i}}nez and
                  Marco Antonio Acevedo{-}Mosqueda and
                  Fabiola Mart{\'{\i}}nez},
  title        = {A Novel Text Encryption Algorithm},
  journal      = {Res. Comput. Sci.},
  volume       = {68},
  pages        = {91--101},
  year         = {2013},
  url          = {http://www.micai.org/rcs/2013\_68/A\%20Novel\%20Text\%20Encryption\%20Algorithm.pdf},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rcs/AcevedoMAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/HermassiRB13,
  author       = {Houcemeddine Hermassi and
                  Rhouma Rhouma and
                  Safya Belghith},
  title        = {Improvement of an image encryption algorithm based on hyper-chaos},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {539--549},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9459-7},
  doi          = {10.1007/S11235-011-9459-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/HermassiRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ems/KesterNPG13,
  author       = {Quist{-}Aphetsi Kester and
                  Laurent Nana and
                  Anca Christine Pascu and
                  Sophie Gire},
  editor       = {David Al{-}Dabass and
                  Alessandra Orsoni and
                  Zheng Xie},
  title        = {A New Encryption Cipher for Securing Digital Images of Video Surveillance
                  Devices Using Diffie-Hellman-MD5 Algorithm and {RGB} Pixel Shuffling},
  booktitle    = {Seventh UKSim/AMSS European Modelling Symposium, {EMS} 2013, 20-22
                  November, 2013, Manchester {UK}},
  pages        = {305--311},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EMS.2013.53},
  doi          = {10.1109/EMS.2013.53},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ems/KesterNPG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/XiaoLRYL13,
  author       = {Limin Xiao and
                  Yongnan Li and
                  Li Ruan and
                  Guangchao Yao and
                  Deguo Li},
  title        = {High Performance Implementation of {ARIA} Encryption Algorithm on
                  Graphics Processing Units},
  booktitle    = {10th {IEEE} International Conference on High Performance Computing
                  and Communications {\&} 2013 {IEEE} International Conference on
                  Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China,
                  November 13-15, 2013},
  pages        = {504--510},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/HPCC.and.EUC.2013.78},
  doi          = {10.1109/HPCC.AND.EUC.2013.78},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/XiaoLRYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/MahmoodDA13,
  author       = {Ahmed B. Mahmood and
                  Robert D. Dony and
                  Shawki Areibi},
  title        = {An adaptive encryption based genetic algorithms for medical images},
  booktitle    = {{IEEE} International Workshop on Machine Learning for Signal Processing,
                  {MLSP} 2013, Southampton, United Kingdom, September 22-25, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/MLSP.2013.6661920},
  doi          = {10.1109/MLSP.2013.6661920},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/mlsp/MahmoodDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/siu/OzkaynakOY13,
  author       = {Fatih {\"{O}}zkaynak and
                  Ahmet Bedri {\"{O}}zer and
                  Sirma Yavuz},
  title        = {Security analysis of an image encryption algorithm based on chaos
                  and {DNA} encoding},
  booktitle    = {21st Signal Processing and Communications Applications Conference,
                  {SIU} 2013, Haspolat, Turkey, April 24-26, 2013},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SIU.2013.6531597},
  doi          = {10.1109/SIU.2013.6531597},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/siu/OzkaynakOY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Bonham-CarterPB13,
  author       = {Oliver Bonham{-}Carter and
                  Abhishek Parakh and
                  Dhundy Bastola},
  title        = {sEncrypt: An Encryption Algorithm Inspired from Biological Processes},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {321--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.43},
  doi          = {10.1109/TRUSTCOM.2013.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Bonham-CarterPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-3485,
  author       = {Ajay Kulkarni and
                  Saurabh Kulkarni and
                  Ketki Haridas and
                  Aniket More},
  title        = {Proposed Video Encryption Algorithm v/s Other Existing Algorithms:
                  {A} Comparative Study},
  journal      = {CoRR},
  volume       = {abs/1303.3485},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.3485},
  eprinttype    = {arXiv},
  eprint       = {1303.3485},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-3485.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/ZhaoLWP12,
  author       = {Pengtao Zhao and
                  Gang Liu and
                  Minghao Wang and
                  Jieli Peng},
  editor       = {Tianqi Zhang},
  title        = {An image encryption algorithm based on multi-scroll chaotic map},
  booktitle    = {5th International Conference on BioMedical Engineering and Informatics,
                  {BMEI} 2012, Chongqing, China, October 16-18, 2012},
  pages        = {186--189},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/BMEI.2012.6512885},
  doi          = {10.1109/BMEI.2012.6512885},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/ZhaoLWP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/TiwariSG12,
  author       = {Kamlesh Tiwari and
                  Ehtesham Akhtar Siddiqui and
                  Phalguni Gupta},
  editor       = {De{-}Shuang Huang and
                  Phalguni Gupta and
                  Xiang Zhang and
                  Prashan Premaratne},
  title        = {An Efficient Image Database Encryption Algorithm},
  booktitle    = {Emerging Intelligent Computing Technology and Applications - 8th International
                  Conference, {ICIC} 2012, Huangshan, China, July 25-29, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {304},
  pages        = {400--407},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31837-5\_58},
  doi          = {10.1007/978-3-642-31837-5\_58},
  timestamp    = {Tue, 23 May 2017 01:06:39 +0200},
  biburl       = {https://dblp.org/rec/conf/icic/TiwariSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/RajGD12,
  author       = {R. Arun Raj and
                  Sudhish N. George and
                  P. P. Deepthi},
  title        = {An expeditious chaos based digital image encryption algorithm},
  booktitle    = {1st International Conference on Recent Advances in Information Technology,
                  {RAIT} 2012, Dhanbad, India, March 15-17, 2012},
  pages        = {14--18},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/RAIT.2012.6194471},
  doi          = {10.1109/RAIT.2012.6194471},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/RajGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rivf/HoangN12,
  author       = {Trang Hoang and
                  Van Loi Nguyen},
  title        = {An Efficient {FPGA} Implementation of the Advanced Encryption Standard
                  Algorithm},
  booktitle    = {2012 {IEEE} {RIVF} International Conference on Computing {\&}
                  Communication Technologies, Research, Innovation, and Vision for the
                  Future (RIVF), Ho Chi Minh City, Vietnam, February 27 - March 1, 2012},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/rivf.2012.6169845},
  doi          = {10.1109/RIVF.2012.6169845},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/rivf/HoangN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rws/ZibidehM12,
  author       = {Walid Y. Zibideh and
                  Mustafa M. Matalgah},
  title        = {An optimized encryption framework based on the modified-DES algorithm:
                  {A} trade-off between security and throughput in wireless channels},
  booktitle    = {2012 {IEEE} Radio and Wireless Symposium, {RWS} 2012, Santa Clara,
                  CA, USA, January 15-18, 2012},
  pages        = {419--422},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/RWS.2012.6175391},
  doi          = {10.1109/RWS.2012.6175391},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/rws/ZibidehM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AvireddyPGKTGGP12,
  author       = {Srinivas Avireddy and
                  Varalakshmi Perumal and
                  Narayan Gowraj and
                  Ram Srivatsa Kannan and
                  Prashanth Thinakaran and
                  Sundaravadanam Ganapthi and
                  Jashwant Raj Gunasekaran and
                  Sruthi Prabhu},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Random4: An Application Specific Randomized Encryption Algorithm to
                  Prevent {SQL} Injection},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {1327--1333},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.232},
  doi          = {10.1109/TRUSTCOM.2012.232},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AvireddyPGKTGGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsp/Anghelescu12,
  author       = {Petre Anghelescu},
  title        = {Hardware implementation of programmable cellular automata encryption
                  algorithm},
  booktitle    = {35th International Conference on Telecommunications and Signal Processing,
                  {TSP} 2012, Prague, Czech Republic, July 3-4, 2012},
  pages        = {18--21},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/TSP.2012.6256189},
  doi          = {10.1109/TSP.2012.6256189},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/tsp/Anghelescu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1204-1651,
  author       = {Ali Elouafiq},
  title        = {Authentication and Encryption in {GSM} and 3GUMTS: An Emphasis on
                  Protocols and Algorithms},
  journal      = {CoRR},
  volume       = {abs/1204.1651},
  year         = {2012},
  url          = {http://arxiv.org/abs/1204.1651},
  eprinttype    = {arXiv},
  eprint       = {1204.1651},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1204-1651.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-4777,
  author       = {Ahmed Bashir Abugharsa and
                  Abd. Samad Hasan Basari and
                  Hamida Almangush},
  title        = {A Novel Image Encryption Using an Integration Technique of Blocks
                  Rotation Based on the Magic Cube and the {AES} Algorithm},
  journal      = {CoRR},
  volume       = {abs/1209.4777},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.4777},
  eprinttype    = {arXiv},
  eprint       = {1209.4777},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-4777.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-2338,
  author       = {Roohallah Rastaghi},
  title        = {An Efficient Encryption Algorithm for {P2P} Networks Robust Against
                  Man-in-the-Middle Adversary},
  journal      = {CoRR},
  volume       = {abs/1211.2338},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.2338},
  eprinttype    = {arXiv},
  eprint       = {1211.2338},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-2338.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/LiCL11,
  author       = {Chengqing Li and
                  Michael Z. Q. Chen and
                  Kwok{-}Tung Lo},
  title        = {Breaking an Image Encryption Algorithm Based on Chaos},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {21},
  number       = {7},
  pages        = {2067--2076},
  year         = {2011},
  url          = {https://doi.org/10.1142/S0218127411029641},
  doi          = {10.1142/S0218127411029641},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbc/LiCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnc/BoKNI11,
  author       = {Bo Song and
                  Kensuke Kawakami and
                  Koji Nakano and
                  Yasuaki Ito},
  title        = {An {RSA} Encryption Hardware Algorithm using a Single {DSP} Block
                  and a Single Block {RAM} on the {FPGA}},
  journal      = {Int. J. Netw. Comput.},
  volume       = {1},
  number       = {2},
  pages        = {277--289},
  year         = {2011},
  url          = {http://www.ijnc.org/index.php/ijnc/article/view/29},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnc/BoKNI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/XiangG11,
  author       = {Fei Xiang and
                  Xiao{-}cong Guo},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Ping Guo and
                  Yingbin Wei},
  title        = {An Image Encryption Algorithm Based on Scrambling and Substitution
                  Using Hybrid Chaotic Systems},
  booktitle    = {Seventh International Conference on Computational Intelligence and
                  Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011},
  pages        = {882--885},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CIS.2011.199},
  doi          = {10.1109/CIS.2011.199},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/XiangG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csee2/TongL11,
  author       = {Xiaojun Tong and
                  Yang Liu},
  editor       = {Song Lin and
                  Xiong Huang},
  title        = {An Image Encryption Algorithm for New Multiple Chaos-Based},
  booktitle    = {Advances in Computer Science, Environment, Ecoinformatics, and Education
                  - International Conference, {CSEE} 2011, Wuhan, China, August 21-22,
                  2011. Proceedings, Part {V}},
  series       = {Communications in Computer and Information Science},
  volume       = {218},
  pages        = {88--93},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23357-9\_17},
  doi          = {10.1007/978-3-642-23357-9\_17},
  timestamp    = {Tue, 19 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csee2/TongL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csise/JinGZ11,
  author       = {Yong{-}Xian Jin and
                  Yi{-}Sheng Guan and
                  Lin Zheng},
  editor       = {David Jin and
                  Sally Lin},
  title        = {An Image Encryption Algorithm Based on Chaos},
  booktitle    = {Advances in Computer Science, Intelligent System and Environment [Proceedings
                  of {CSISE} 2011, Volume 3, September 24-25, 2011, Guangzhou, China]},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {106},
  pages        = {493--497},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23753-9\_79},
  doi          = {10.1007/978-3-642-23753-9\_79},
  timestamp    = {Fri, 19 May 2017 01:26:02 +0200},
  biburl       = {https://dblp.org/rec/conf/csise/JinGZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccs/Acharya11,
  author       = {Anuja Kumar Acharya},
  editor       = {Sanjay Kumar Jena and
                  Rajeev Kumar and
                  Ashok Kumar Turuk and
                  Manoranjan Dash},
  title        = {Image encryption using a new chaos based encryption algorithm},
  booktitle    = {Proceedings of the 2011 International Conference on Communication,
                  Computing {\&} Security, {ICCCS} 2011, Odisha, India, February
                  12-14, 2011},
  pages        = {577--581},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1947940.1948060},
  doi          = {10.1145/1947940.1948060},
  timestamp    = {Sat, 22 Apr 2023 12:33:17 +0200},
  biburl       = {https://dblp.org/rec/conf/icccs/Acharya11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JeongLH11,
  author       = {Kyung Chul Jeong and
                  Dong Hoon Lee and
                  Daewan Han},
  editor       = {Howon Kim},
  title        = {An Improved Known Plaintext Attack on {PKZIP} Encryption Algorithm},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {235--247},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_16},
  doi          = {10.1007/978-3-642-31912-9\_16},
  timestamp    = {Wed, 01 Mar 2023 16:53:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/JeongLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AnghelescuII11,
  author       = {Petre Anghelescu and
                  Silviu Ionita and
                  Vasile{-}Gabriel Iana},
  title        = {{FPGA} implementation of cellular automata based encryption algorithm
                  for internet communications},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {208--213},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148379/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AnghelescuII11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwet/HingmireIA11,
  author       = {Anil Hingmire and
                  D. R. Ingle and
                  Rahul Ambekar},
  editor       = {B. K. Mishra},
  title        = {A new data encryption {\&} decryption algorithm {(PSZ} proposal):
                  a comparison with {RSA}},
  booktitle    = {Proceedings of the {ICWET} '11 International Conference {\&} Workshop
                  on Emerging Trends in Technology, Mumbai, Maharashtra, India, February
                  25 - 26, 2011},
  pages        = {1366},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1980022.1980361},
  doi          = {10.1145/1980022.1980361},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwet/HingmireIA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscid/MaoC11,
  author       = {Yongyi Mao and
                  Xiang Chen},
  title        = {An Encryption Algorithm of Chaos Based on Sine Square Mapping},
  booktitle    = {4th International Symposium on Computational Intelligence and Design,
                  {ISCID} 2011, Hangzhou, China, October 28-30, 2011, 2 Volumes},
  pages        = {131--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISCID.2011.41},
  doi          = {10.1109/ISCID.2011.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscid/MaoC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscide/ZhangLSZC11,
  author       = {Xuanping Zhang and
                  Zhigang Liang and
                  Liping Shao and
                  Yuqian Zhang and
                  Qingyuan Chen},
  editor       = {Yanning Zhang and
                  Zhi{-}Hua Zhou and
                  Changshui Zhang and
                  Ying Li},
  title        = {An Image Encryption Algorithm Based on Small Permutation Array Combining},
  booktitle    = {Intelligent Science and Intelligent Data Engineering - Second Sino-foreign-interchange
                  Workshop, IScIDE 2011, Xi'an, China, October 23-25, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7202},
  pages        = {652--659},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31919-8\_83},
  doi          = {10.1007/978-3-642-31919-8\_83},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/iscide/ZhangLSZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socpar/MittalM11,
  author       = {Varun Mittal and
                  Piyush Murli Agarwal},
  editor       = {Ajith Abraham and
                  Hongbo Liu and
                  Fuchun Sun and
                  Chen Guo and
                  Se{\'{a}}n F. McLoone and
                  Emilio Corchado},
  title        = {An encryption and decryption algorithm for messages transmitted by
                  phonetic alphabets},
  booktitle    = {Third International Conference of Soft Computing and Pattern Recognition,
                  SoCPaR 2011, Dalian, China, October 14-16, 2011},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SoCPaR.2011.6089104},
  doi          = {10.1109/SOCPAR.2011.6089104},
  timestamp    = {Wed, 20 Jan 2021 09:06:52 +0100},
  biburl       = {https://dblp.org/rec/conf/socpar/MittalM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/Anghelescu11,
  author       = {Petre Anghelescu},
  title        = {Encryption algorithm using Programmable Cellular Automata},
  booktitle    = {2011 World Congress on Internet Security, WorldCIS 2011, London, UK,
                  February 21-23, 2011},
  pages        = {233--239},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/5749858/},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/worldcis/Anghelescu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Chmielowiec10,
  author       = {Andrzej Chmielowiec},
  title        = {Fixed points of the {RSA} encryption algorithm},
  journal      = {Theor. Comput. Sci.},
  volume       = {411},
  number       = {1},
  pages        = {288--292},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.tcs.2009.09.030},
  doi          = {10.1016/J.TCS.2009.09.030},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/Chmielowiec10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/SongKNI10,
  author       = {Bo Song and
                  Kensuke Kawakami and
                  Koji Nakano and
                  Yasuaki Ito},
  title        = {An {RSA} Encryption Hardware Algorithm Using a Single {DSP} Block
                  and a Single Block {RAM} on the {FPGA}},
  booktitle    = {First International Conference on Networking and Computing, {ICNC}
                  2010, Higashi Hiroshima, Japan, November 17-19, 2010. Proceedings},
  pages        = {140--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IC-NC.2010.56},
  doi          = {10.1109/IC-NC.2010.56},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/SongKNI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwet/WattalAK10,
  author       = {Akshay Wattal and
                  Anjali Agarwal and
                  Ankit Kathuria},
  editor       = {B. K. Mishra},
  title        = {Astute image encryption and decryption using modified secure image
                  encryption algorithm {(M-SIP)}},
  booktitle    = {Proceedings of the {ICWET} '10 International Conference {\&} Workshop
                  on Emerging Trends in Technology, Mumbai, Maharashtra, India, February
                  26 - 27, 2010},
  pages        = {1007},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741906.1742176},
  doi          = {10.1145/1741906.1742176},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwet/WattalAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OguraYKU10,
  author       = {Naoki Ogura and
                  Go Yamamoto and
                  Tetsutaro Kobayashi and
                  Shigenori Uchiyama},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {An Improvement of Key Generation Algorithm for Gentry's Homomorphic
                  Encryption Scheme},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {70--83},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_6},
  doi          = {10.1007/978-3-642-16825-3\_6},
  timestamp    = {Mon, 15 Jun 2020 17:00:57 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OguraYKU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skg/XiaoCX10,
  author       = {Qili Xiao and
                  Bencheng Chai and
                  Qimin Xiao},
  title        = {An Image Encryption Algorithm Based on Sequence},
  booktitle    = {Sixth International Conference on Semantics Knowledge and Grid, {SKG}
                  2010, Beijing, China, November 1-3, 2010},
  pages        = {398--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SKG.2010.69},
  doi          = {10.1109/SKG.2010.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skg/XiaoCX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1007-3862,
  author       = {Chengqing Li and
                  Michael Z. Q. Chen and
                  Kwok{-}Tung Lo},
  title        = {Breaking an image encryption algorithm based on chaos},
  journal      = {CoRR},
  volume       = {abs/1007.3862},
  year         = {2010},
  url          = {http://arxiv.org/abs/1007.3862},
  eprinttype    = {arXiv},
  eprint       = {1007.3862},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1007-3862.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ChenH09,
  author       = {Ming{-}Chih Chen and
                  Shen{-}Fu Hsiao},
  title        = {Low Cost Design of an Advanced Encryption Standard {(AES)} Processor
                  Using a New Common-Subexpression-Elimination Algorithm},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {12},
  pages        = {3221--3228},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.3221},
  doi          = {10.1587/TRANSFUN.E92.A.3221},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ChenH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChardinM09,
  author       = {Thomas Chardin and
                  Rapha{\"{e}}l Marinier},
  title        = {An Adaptive Chosen-plaintext Attack of the Improved Cellular Message
                  Encryption Algorithm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {173--179},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v9-n2/ijns-2009-v9-n2-p173-179.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChardinM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/LiuSX09,
  author       = {Shubo Liu and
                  Jing Sun and
                  Zhengquan Xu},
  title        = {An Improved Image Encryption Algorithm based on Chaotic System},
  journal      = {J. Comput.},
  volume       = {4},
  number       = {11},
  pages        = {1091--1100},
  year         = {2009},
  url          = {http://www.jcomputers.us/index.php?m=content\&c=index\&a=show\&catid=98\&id=1465},
  doi          = {10.4304/JCP.4.11.1091-1100},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/LiuSX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/Wuensche09,
  author       = {Andrew Wuensche},
  title        = {Cellular Automata Encryption: the reverse algorithm, Z-parameter and
                  chain-rules},
  journal      = {Parallel Process. Lett.},
  volume       = {19},
  number       = {2},
  pages        = {283--297},
  year         = {2009},
  url          = {https://doi.org/10.1142/S0129626409000225},
  doi          = {10.1142/S0129626409000225},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppl/Wuensche09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/WangBZS09,
  author       = {Fangchao Wang and
                  Sen Bai and
                  Guibin Zhu and
                  Zhenghui Song},
  editor       = {Huaikou Miao and
                  Gongzhu Hu},
  title        = {An Image Encryption Algorithm Based on N-Dimension Affine Transformation},
  booktitle    = {8th {IEEE/ACIS} International Conference on Computer and Information
                  Science, {IEEE/ACIS} {ICIS} 2009, June 1-3, 2009, Shanghai, China},
  pages        = {579--585},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICIS.2009.31},
  doi          = {10.1109/ICIS.2009.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/WangBZS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adma/LuY09,
  author       = {Wei Lu and
                  Zheng{-}an Yao},
  editor       = {Ronghuai Huang and
                  Qiang Yang and
                  Jian Pei and
                  Jo{\~{a}}o Gama and
                  Xiaofeng Meng and
                  Xue Li},
  title        = {Nearest Neighbor Tour Circuit Encryption Algorithm Based Random Isomap
                  Reduction},
  booktitle    = {Advanced Data Mining and Applications, 5th International Conference,
                  {ADMA} 2009, Beijing, China, August 17-19, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5678},
  pages        = {246--252},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03348-3\_25},
  doi          = {10.1007/978-3-642-03348-3\_25},
  timestamp    = {Sun, 02 Oct 2022 15:53:57 +0200},
  biburl       = {https://dblp.org/rec/conf/adma/LuY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/YahyaA09,
  author       = {Adbelfatah Yahya and
                  Ayman M. Abdalla},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {An AES-Based Encryption Algorithm with Shuffling},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {113--116},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 20 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/YahyaA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/WangZL09,
  author       = {Xiao{-}yu Wang and
                  Han Zhang and
                  Zhao{-}hui Li},
  editor       = {Haiying Wang and
                  Kay Soon Low and
                  Kexin Wei and
                  Junqing Sun},
  title        = {An Improved Baptista Encryption Algorithm Based on Conservative Chaotic
                  System},
  booktitle    = {Fifth International Conference on Natural Computation, {ICNC} 2009,
                  Tianjian, China, 14-16 August 2009, 6 Volumes},
  pages        = {442--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICNC.2009.589},
  doi          = {10.1109/ICNC.2009.589},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnc/WangZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/LiY09,
  author       = {Weihai Li and
                  Yuan Yuan},
  title        = {Improving Security of an Image Encryption Algorithm based on Chaotic
                  Circular Shift},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, San Antonio, TX, USA, 11-14 October 2009},
  pages        = {3694--3698},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICSMC.2009.5346875},
  doi          = {10.1109/ICSMC.2009.5346875},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smc/LiY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/ZhuZ08,
  author       = {Gui{-}Liang Zhu and
                  Xiaoqiang Zhang},
  title        = {Mixed image element encryption algorithm based on an elliptic curve
                  cryptosystem},
  journal      = {J. Electronic Imaging},
  volume       = {17},
  number       = {2},
  pages        = {023007},
  year         = {2008},
  url          = {https://doi.org/10.1117/1.2931495},
  doi          = {10.1117/1.2931495},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/ZhuZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/DeleiSW08,
  author       = {Jiang Delei and
                  Bai Sen and
                  Dong Wenming},
  title        = {An Image Encryption Algorithm Based on Knight's Tour and Slip Encryption-Filter},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 1: Artificial Intelligence, December 12-14, 2008,
                  Wuhan, China},
  pages        = {251--255},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.1142},
  doi          = {10.1109/CSSE.2008.1142},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/DeleiSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/AnghelescuIS08,
  author       = {Petre Anghelescu and
                  Silviu Ionita and
                  Emil Sofron},
  editor       = {Fatos Xhafa and
                  Francisco Herrera and
                  Ajith Abraham and
                  Mario K{\"{o}}ppen and
                  Jos{\'{e}} Manuel Ben{\'{\i}}tez},
  title        = {{FPGA} Implementation of Hybrid Additive Programmable Cellular Automata
                  Encryption Algorithm},
  booktitle    = {8th International Conference on Hybrid Intelligent Systems {(HIS}
                  2008), September 10-12, 2008, Barcelona, Spain},
  pages        = {96--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HIS.2008.24},
  doi          = {10.1109/HIS.2008.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/his/AnghelescuIS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/Henricksen08,
  author       = {Matthew Henricksen},
  title        = {Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks},
  booktitle    = {10th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2008, 25-27 Sept. 2008, Dalian, China},
  pages        = {795--800},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HPCC.2008.51},
  doi          = {10.1109/HPCC.2008.51},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/Henricksen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/ChenZY08,
  author       = {Dongming Chen and
                  Zhiliang Zhu and
                  Guangming Yang},
  title        = {An Improved Image Encryption Algorithm Based on Chaos},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {2792--2796},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.519},
  doi          = {10.1109/ICYCS.2008.519},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/ChenZY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/LiP08,
  author       = {Shuaijun Li and
                  Fei Peng},
  title        = {An Encryption Algorithm for 2D Engineering Graphics' Content Based
                  on Chaos Systems},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {1435--1439},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.111},
  doi          = {10.1109/ICYCS.2008.111},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/LiP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paciia/WangYY08,
  author       = {JiaJing Wang and
                  BaiLong Yang and
                  Zhe Yang},
  title        = {An Algorithm of Information Hiding Based on Compound Encryption in
                  Non-Uniform B-Spline Wavelet Domain},
  booktitle    = {{PACIIA} 2008, Volume 2, 2008 {IEEE} Pacific-Asia Workshop on Computational
                  Intelligence and Industrial Application, 19-20 December 2008, Wuhan,
                  China},
  pages        = {190--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PACIIA.2008.274},
  doi          = {10.1109/PACIIA.2008.274},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paciia/WangYY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5116,
  author       = {David A. McGrew},
  title        = {An Interface and Algorithms for Authenticated Encryption},
  journal      = {{RFC}},
  volume       = {5116},
  pages        = {1--22},
  year         = {2008},
  url          = {https://doi.org/10.17487/RFC5116},
  doi          = {10.17487/RFC5116},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/NgW07,
  author       = {Danny Ng and
                  Andrew Woodward},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {Implications for Use of Different Encryption Algorithms on Power Consumption
                  for Mobile Devices in the Healthcare Industry},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {496--500},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/NgW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/ChrysosDBM07,
  author       = {Grigorios Chrysos and
                  Apostolos Dollas and
                  Nikolaos G. Bourbakis and
                  J. Sukarno Mertoguno},
  editor       = {Kenneth L. Pocek and
                  Duncan A. Buell},
  title        = {An Integrated Video Compression, Encryption and Information Hiding
                  Architecture based on the {SCAN} Algorithm and the Stretch Technology},
  booktitle    = {{IEEE} Symposium on Field-Programmable Custom Computing Machines,
                  {FCCM} 2007, 23-25 April 2007, Napa, California, {USA}},
  pages        = {327--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FCCM.2007.37},
  doi          = {10.1109/FCCM.2007.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/ChrysosDBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/FuZC07,
  author       = {Chong Fu and
                  Zhen{-}chuan Zhang and
                  Ying{-}yu Cao},
  editor       = {Jingsheng Lei and
                  JingTao Yao and
                  Qingfu Zhang},
  title        = {An Improved Image Encryption Algorithm Based on Chaotic Maps},
  booktitle    = {Third International Conference on Natural Computation, {ICNC} 2007,
                  Haikou, Hainan, China, 24-27 August 2007, Volume 3},
  pages        = {189--193},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNC.2007.215},
  doi          = {10.1109/ICNC.2007.215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnc/FuZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/MianJL07,
  author       = {Mian Cai and
                  Jia Jia and
                  Yan Lei},
  editor       = {Bin{-}Yih Liao and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain and
                  Mark Liao and
                  Hideki Noda and
                  Anthony T. S. Ho},
  title        = {An {H.264} Video Encryption Algorithm Based On Entropy Coding},
  booktitle    = {3rd International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan,
                  26-28 November 2007, Proceedings},
  pages        = {41--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IIH-MSP.2007.86},
  doi          = {10.1109/IIH-MSP.2007.86},
  timestamp    = {Fri, 24 Mar 2023 08:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/MianJL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/DongLXHJ07,
  author       = {Chen Dong and
                  Jifang Li and
                  Lifeng Xi and
                  Jie Hao and
                  Ran Jin},
  editor       = {Bruno Apolloni and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Improvement of an Image Encryption Algorithm Based on Combined Multidimensional
                  Chaotic Systems},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 11th
                  International Conference, {KES} 2007, {XVII} Italian Workshop on Neural
                  Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4693},
  pages        = {209--216},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74827-4\_27},
  doi          = {10.1007/978-3-540-74827-4\_27},
  timestamp    = {Fri, 01 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/DongLXHJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0710-4800,
  author       = {Hala A. Farouk and
                  Magdy Saeb},
  title        = {An Improved {FPGA} Implementation of the Modified Hybrid Hiding Encryption
                  Algorithm {(MHHEA)} for Data Communication Security},
  journal      = {CoRR},
  volume       = {abs/0710.4800},
  year         = {2007},
  url          = {http://arxiv.org/abs/0710.4800},
  eprinttype    = {arXiv},
  eprint       = {0710.4800},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0710-4800.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0710-5465,
  author       = {David Arroyo and
                  Chengqing Li and
                  Shujun Li and
                  Gonzalo {\'{A}}lvarez and
                  Wolfgang A. Halang},
  title        = {Cryptanalysis of an image encryption scheme based on a new total shuffling
                  algorithm},
  journal      = {CoRR},
  volume       = {abs/0710.5465},
  year         = {2007},
  url          = {http://arxiv.org/abs/0710.5465},
  eprinttype    = {arXiv},
  eprint       = {0710.5465},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0710-5465.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icicic/GuH06,
  author       = {Guosheng Gu and
                  Guoqiang Han},
  title        = {An Enhanced Chaos Based Image Encryption Algorithm},
  booktitle    = {First International Conference on Innovative Computing, Information
                  and Control {(ICICIC} 2006), 30 August - 1 September 2006, Beijing,
                  China},
  pages        = {492--495},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICICIC.2006.46},
  doi          = {10.1109/ICICIC.2006.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icicic/GuH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/KitsosGK05,
  author       = {Paris Kitsos and
                  Michalis D. Galanis and
                  Odysseas G. Koufopavlou},
  title        = {An Fpga Implementation of the Gprs Encryption Algorithm 3 (gea3)},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {217--232},
  year         = {2005},
  url          = {https://doi.org/10.1142/S0218126605002337},
  doi          = {10.1142/S0218126605002337},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsc/KitsosGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/ThaduriYG05,
  author       = {M. Thaduri and
                  Seong{-}Moo Yoo and
                  Rhonda Kay Gaede},
  title        = {An efficient {VLSI} implementation of {IDEA} encryption algorithm
                  using {VHDL}},
  journal      = {Microprocess. Microsystems},
  volume       = {29},
  number       = {1},
  pages        = {1--7},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.micpro.2004.06.002},
  doi          = {10.1016/J.MICPRO.2004.06.002},
  timestamp    = {Fri, 20 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/ThaduriYG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/Arafat05,
  author       = {S. M. Arafat},
  title        = {An encryption algorithm based on alphabetic trees},
  booktitle    = {2005 {ACS} / {IEEE} International Conference on Computer Systems and
                  Applications {(AICCSA} 2005), January 3-6, 2005, Cairo, Egypt},
  pages        = {92},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AICCSA.2005.1387083},
  doi          = {10.1109/AICCSA.2005.1387083},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/Arafat05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/FaroukS05,
  author       = {Hala A. Farouk and
                  Magdy Saeb},
  title        = {An Improved {FPGA} Implementation of the Modified Hybrid Hiding Encryption
                  Algorithm {(MHHEA)} for Data Communication Security},
  booktitle    = {2005 Design, Automation and Test in Europe Conference and Exposition
                  {(DATE} 2005), 7-11 March 2005, Munich, Germany},
  pages        = {76--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/DATE.2005.58},
  doi          = {10.1109/DATE.2005.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/FaroukS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/ErgulerA05,
  author       = {Imran Erguler and
                  Emin Anarim},
  title        = {A modified stream generator for the {GSM} encryption algorithms {A5/1}
                  and {A5/2}},
  booktitle    = {13th European Signal Processing Conference, {EUSIPCO} 2005, Antalya,
                  Turkey, September 4-8, 2005},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://ieeexplore.ieee.org/document/7078405/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/ErgulerA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/WangH04,
  author       = {Pang{-}Chieh Wang and
                  Ting{-}Wei Hou},
  title        = {An {AV} object oriented encryption algorithm for {MPEG-4} streams},
  booktitle    = {Proceedings of the 2004 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2004, 27-30 June 2004, Taipei, Taiwan},
  pages        = {971--974},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/WangH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/WangN04,
  author       = {Shuenn{-}Shyang Wang and
                  Wan{-}Sheng Ni},
  title        = {An efficient {FPGA} implementation of advanced encryption standard
                  algorithm},
  booktitle    = {Proceedings of the 2004 International Symposium on Circuits and Systems,
                  {ISCAS} 2004, Vancouver, BC, Canada, May 23-26, 2004},
  pages        = {597--600},
  publisher    = {{IEEE}},
  year         = {2004},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/WangN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sbcci/Zigiottod02,
  author       = {Anderson Cattelan Zigiotto and
                  Roberto d'Amore},
  title        = {A Low-Cost {FPGA} Implementation of the Advanced Encryption Standard
                  Algorithm},
  booktitle    = {Proceedings of the 15th Annual Symposium on Integrated Circuits and
                  Systems Design, {SBCCI} 2002, Porto Alegre, Brazil, September 9-14,
                  2002},
  pages        = {191--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://dl.acm.org/doi/10.5555/827246.827394},
  doi          = {10.5555/827246.827394},
  timestamp    = {Fri, 10 Jun 2022 11:12:41 +0200},
  biburl       = {https://dblp.org/rec/conf/sbcci/Zigiottod02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GootsMM01,
  author       = {Nick D. Goots and
                  Alexander A. Moldovyan and
                  Nick A. Moldovyan},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Fast Encryption Algorithm Spectr-H64},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {275--286},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_27},
  doi          = {10.1007/3-540-45116-1\_27},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GootsMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Law00,
  author       = {Tak{-}Ming Law},
  title        = {An Encryption Algorithm and Key-stream Generator for Chinese Text
                  Messages by Character Internal Code Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Law00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/WassalH99,
  author       = {Amr G. Wassal and
                  M. Anwarul Hasan},
  title        = {A {VLSI} Architecture for {ATM} Algorithm-Agile Encryption},
  booktitle    = {9th Great Lakes Symposium on {VLSI} {(GLS-VLSI} '99), 4-6 March 1999,
                  Ann Arbor, MI, {USA}},
  pages        = {325},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/GLSV.1999.757444},
  doi          = {10.1109/GLSV.1999.757444},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/WassalH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MoldovyanM98,
  author       = {Alexander A. Moldovyan and
                  Nikolay A. Moldovyan},
  title        = {Software Encryption Algorithms for Transparent Protection Technology},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {56--68},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886786},
  doi          = {10.1080/0161-119891886786},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MoldovyanM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/ShiB98,
  author       = {Changgui Shi and
                  Bharat K. Bhargava},
  title        = {An Efficient {MPEG} Video Encryption Algorithm},
  booktitle    = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS}
                  1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings},
  pages        = {381--386},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/RELDIS.1998.740527},
  doi          = {10.1109/RELDIS.1998.740527},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/ShiB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpa/Orlowski95,
  author       = {Steve Orlowski},
  editor       = {Ed Dawson and
                  Jovan Dj. Golic},
  title        = {Encryption and the Gloval Information Infrastructure: An Australian
                  Perspective},
  booktitle    = {Cryptography: Policy and Algorithms, International Conference, Brisbane,
                  Queensland, Australia, July 3-5, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1029},
  pages        = {65--74},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0032346},
  doi          = {10.1007/BFB0032346},
  timestamp    = {Sat, 19 Oct 2019 20:36:44 +0200},
  biburl       = {https://dblp.org/rec/conf/cpa/Orlowski95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/WolterMSL95,
  author       = {Stefan Wolter and
                  Holger Matz and
                  Andreas Schubert and
                  Rainer Laur},
  title        = {On the {VLSI} Implementation of the International Data Encryption
                  Algorithm {IDEA}},
  booktitle    = {1995 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  1995, Seattle, Washington, USA, April 30 - May 3, 1995},
  pages        = {397--400},
  publisher    = {{IEEE}},
  year         = {1995},
  url          = {https://doi.org/10.1109/ISCAS.1995.521534},
  doi          = {10.1109/ISCAS.1995.521534},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/WolterMSL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jssc/ZimmermannCBKFF94,
  author       = {Reto Zimmermann and
                  Andreas Curiger and
                  Heinz Bonnenberg and
                  Hubert Kaeslin and
                  Norbert Felber and
                  Wolfgang Fichtner},
  title        = {A 177 Mb/s {VLSI} implementation of the International Data Encryption
                  Algorithm},
  journal      = {{IEEE} J. Solid State Circuits},
  volume       = {29},
  number       = {3},
  pages        = {303--307},
  year         = {1994},
  url          = {https://doi.org/10.1109/4.278352},
  doi          = {10.1109/4.278352},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jssc/ZimmermannCBKFF94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OrtonRSPT86,
  author       = {Glenn A. Orton and
                  M. P. Roy and
                  P. Andrew Scott and
                  Lloyd E. Peppard and
                  Stafford E. Tavares},
  editor       = {Andrew M. Odlyzko},
  title        = {{VLSI} Implementation of Public-Key Encryption Algorithms},
  booktitle    = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California,
                  USA, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {263},
  pages        = {277--301},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-47721-7\_22},
  doi          = {10.1007/3-540-47721-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OrtonRSPT86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics