Found: 1570
Select item for more details and to access through your institution.
Cryptanalyzing an Image Encryption Scheme Using Synchronization of Memristor Chaotic Systems.
- Published in:
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2024, v. 34, n. 11, p. 1, doi. 10.1142/S0218127424501384
- By:
- Publication type:
- Article
Nonconformance With Regulatory Codes in the Nonprofit Sector: Accountability and the Discursive Coupling of Means and Ends.
- Published in:
- Business & Society, 2020, v. 59, n. 4, p. 749, doi. 10.1177/0007650317748638
- By:
- Publication type:
- Article
Quantum Attacks on MIBS Block Cipher Based on Bernstein–Vazirani Algorithm.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 17, p. 2678, doi. 10.3390/math12172678
- By:
- Publication type:
- Article
Concealed Chosen Plaintext Attack on Multiple S-boxes Based Image Encryption.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 114, doi. 10.54216/JCIM.140108
- By:
- Publication type:
- Article
Novel cryptosystem integrating the Vigenere cipher and one Feistel round for color image encryption.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2024, v. 14, n. 5, p. 5701, doi. 10.11591/ijece.v14i5.pp5701-5714
- By:
- Publication type:
- Article
암호 회로로부터 방출된 전자파 평가를 통한 오류 주입 위치 탐색.
- Published in:
- Journal of Korean Institute of Electromagnetic Engineering & Science / Han-Guk Jeonjapa Hakoe Nonmunji, 2024, v. 35, n. 7, p. 585, doi. 10.5515/KJKIEES.2024.35.7.585
- By:
- Publication type:
- Article
Quantum Automated Tools for Finding Impossible Differentials.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 16, p. 2598, doi. 10.3390/math12162598
- By:
- Publication type:
- Article
Differential–Linear Approximations of CHAM.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3141, doi. 10.3390/electronics13163141
- By:
- Publication type:
- Article
Dual-band complex-amplitude metasurface empowered high security cryptography with ultra-massive encodable patterns.
- Published in:
- Nanophotonics (21928606), 2024, v. 13, n. 20, p. 3915, doi. 10.1515/nanoph-2024-0314
- By:
- Publication type:
- Article
XOR Vector Space based S-Box generation and its Application to DES and AES for the Time-Efficient Image Encryption.
- Published in:
- International Journal on Electrical Engineering & Informatics, 2024, v. 16, n. 2, p. 180, doi. 10.15676/ijeei.2024.16.2.3
- By:
- Publication type:
- Article
SC-SA: Byte-Oriented Lightweight Stream Ciphers Based on S-Box Substitution.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 8, p. 1051, doi. 10.3390/sym16081051
- By:
- Publication type:
- Article
Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 8, p. 954, doi. 10.3390/sym16080954
- By:
- Publication type:
- Article
On Jargon: Randomness in Cryptography.
- Published in:
- UMAP Journal, 2018, v. 39, n. 1, p. 69
- By:
- Publication type:
- Article
Nonmaterial Performance.
- Published in:
- TDR: The Drama Review (MIT Press), 2020, v. 64, n. 4, p. 147, doi. 10.1162/dram_a_00969
- By:
- Publication type:
- Article
QR HUG: A Study on the Development of a Game to Manage a Shelter Using QR Codes.
- Published in:
- Simulation & Gaming, 2019, v. 50, n. 5, p. 494, doi. 10.1177/1046878119867390
- By:
- Publication type:
- Article
Obfuscation of Embedded Codes in Additive Manufactured Components for Product Authentication.
- Published in:
- Advanced Engineering Materials, 2019, v. 21, n. 8, p. N.PAG, doi. 10.1002/adem.201900146
- By:
- Publication type:
- Article
Highly secured image hiding technique in stereo audio signal based on complete complementary codes.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 24, p. 34373, doi. 10.1007/s11042-019-08122-x
- By:
- Publication type:
- Article
Securing audio data using K-shuffle technique.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 23, p. 33985, doi. 10.1007/s11042-019-08151-6
- By:
- Publication type:
- Article
An efficient LSH indexing on discriminative short codes for high-dimensional nearest neighbors.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 17, p. 24407, doi. 10.1007/s11042-018-6987-0
- By:
- Publication type:
- Article
An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 16, p. 22977, doi. 10.1007/s11042-019-7640-2
- By:
- Publication type:
- Article
High-payload secret hiding mechanism for QR codes.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 16, p. 22331, doi. 10.1007/s11042-019-7600-x
- By:
- Publication type:
- Article
Design and Implementation of novel datapath designs of lightweight cipher RECTANGLE for resource constrained environment.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 16, p. 23659, doi. 10.1007/s11042-019-7587-3
- By:
- Publication type:
- Article
A two-level QR code scheme based on polynomial secret sharing.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 15, p. 21291, doi. 10.1007/s11042-019-7455-1
- By:
- Publication type:
- Article
Embedded image coding using laplace transform for Turkish letters.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 13, p. 17521, doi. 10.1007/s11042-018-7096-9
- By:
- Publication type:
- Article
Lightweight, dynamic and efficient image encryption scheme.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 12, p. 16527, doi. 10.1007/s11042-018-7000-7
- By:
- Publication type:
- Article
Efficient and secure cipher scheme for multimedia contents.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 11, p. 14837, doi. 10.1007/s11042-018-6845-0
- By:
- Publication type:
- Article
Single sample face recognition via BoF using multistage KNN collaborative coding.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 10, p. 13297, doi. 10.1007/s11042-018-7002-5
- By:
- Publication type:
- Article
Computationally efficient selective video encryption with chaos based block cipher.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 21, p. 27981, doi. 10.1007/s11042-018-6022-5
- By:
- Publication type:
- Article
Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18415, doi. 10.1007/s11042-018-5663-8
- By:
- Publication type:
- Article
One round cipher algorithm for multimedia IoT devices.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18383, doi. 10.1007/s11042-018-5660-y
- By:
- Publication type:
- Article
Reliable steganalysis of HUGO steganography based on partially known plaintext.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18007, doi. 10.1007/s11042-017-5134-7
- By:
- Publication type:
- Article
Reversible data hiding in encrypted AMBTC images.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18067, doi. 10.1007/s11042-017-4957-6
- By:
- Publication type:
- Article
A white-box AES-like implementation based on key-dependent substitution-linear transformations.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18117, doi. 10.1007/s11042-017-4562-8
- By:
- Publication type:
- Article
A new audio steganalysis method based on linear prediction.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 12, p. 15431, doi. 10.1007/s11042-017-5123-x
- By:
- Publication type:
- Article
A new efficient lightweight and secure image cipher scheme.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 12, p. 15457, doi. 10.1007/s11042-017-5124-9
- By:
- Publication type:
- Article
Decoder driven side information generation using ensemble of MLP networks for distributed video coding.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 12, p. 15221, doi. 10.1007/s11042-017-5103-1
- By:
- Publication type:
- Article
A proactive secret image sharing scheme with resistance to machine learning based steganalysis.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 12, p. 15161, doi. 10.1007/s11042-017-5097-8
- By:
- Publication type:
- Article
An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD).
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 12, p. 14705, doi. 10.1007/s11042-017-5056-4
- By:
- Publication type:
- Article
A proxy broadcast re-encryption for cloud data sharing.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 9, p. 10455, doi. 10.1007/s11042-017-4448-9
- By:
- Publication type:
- Article
Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 19, p. 19507, doi. 10.1007/s11042-015-3187-z
- By:
- Publication type:
- Article
A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 14, p. 15561, doi. 10.1007/s11042-016-3858-4
- By:
- Publication type:
- Article
A two-stage traitor tracing scheme for hierarchical fingerprints.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 12, p. 14405, doi. 10.1007/s11042-016-3749-8
- By:
- Publication type:
- Article
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 10, p. 5439, doi. 10.1007/s11042-015-2511-y
- By:
- Publication type:
- Article
Pure spatial rich model features for digital image steganalysis.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 5, p. 2897, doi. 10.1007/s11042-015-2521-9
- By:
- Publication type:
- Article
A new image encryption scheme based on cyclic elliptic curve and chaotic system.
- Published in:
- Multimedia Tools & Applications, 2014, v. 70, n. 3, p. 1559, doi. 10.1007/s11042-012-1173-2
- By:
- Publication type:
- Article
Image scrambling based on chaotic sequences and Veginère cipher.
- Published in:
- Multimedia Tools & Applications, 2013, v. 66, n. 3, p. 573, doi. 10.1007/s11042-012-1281-z
- By:
- Publication type:
- Article
Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system.
- Published in:
- Multimedia Tools & Applications, 2012, v. 56, n. 2, p. 267, doi. 10.1007/s11042-010-0590-3
- By:
- Publication type:
- Article
An objective visual security assessment for cipher-images based on local entropy.
- Published in:
- Multimedia Tools & Applications, 2011, v. 53, n. 1, p. 75, doi. 10.1007/s11042-010-0491-5
- By:
- Publication type:
- Article
An efficient implementation of a low-complexity MP3 algorithm with a stream cipher.
- Published in:
- Multimedia Tools & Applications, 2007, v. 35, n. 3, p. 335, doi. 10.1007/s11042-007-0110-2
- By:
- Publication type:
- Article
ORSCA-GPU: one round stream cipher algorithm for GPU implementation.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 9, p. 11744, doi. 10.1007/s11227-022-04335-4
- By:
- Publication type:
- Article