共 50 条
[31]
A Single-Key Attack on the Full GOST Block Cipher
[J].
FAST SOFTWARE ENCRYPTION (FSE 2011),
2011, 6733
:290-305
[32]
Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher
[J].
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1,
2015, 327
:481-488
[35]
Hash key-based image cryptosystem using chaotic maps and cellular automata
[J].
2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD),
2018,
:190-194
[38]
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution
[J].
IEEE ACCESS,
2022, 10
:12966-12982
[39]
VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography
[J].
2024 IEEE 7TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SIGNAL AND IMAGE PROCESSING, ATSIP 2024,
2024,
:376-381