Image cipher applications using the elliptical curve and chaos
DOI10.34768/amcs-2020-0029zbMath1462.94007OpenAlexW3091620623MaRDI QIDQ2023651
Víctor Manuel Silva-García, Bejamín Luna-Benoso, Juan Carlos Chimal-Eguía, Rolando Flores-Carapia, Carlos Rentería Márquez
Publication date: 3 May 2021
Published in: International Journal of Applied Mathematics and Computer Science (Search for Journal in Brave)
Full work available at URL: https://content.sciendo.com/view/journals/amcs/30/2/article-p377.xml
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Image processing (compression, reconstruction, etc.) in information and communication theory (94A08) Numerical methods for discrete and fast Fourier transforms (65T50)
Cites Work
- A Mathematical Theory of Communication
- Large deviations upper bounds and central limit theorems for non-commutative functionals of Gaussian large random matrices
- MOV attack in various subgroups on elliptic curves
- Stability, bifurcation and a new chaos in the logistic differential equation with delay
- Uniform distribution and quasi-Monte Carlo methods. Discrepancy, integration and applications. Based on invited talks of the workspop, Linz, Austria, October 14--18, 2013
- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Image cipher applications using the elliptical curve and chaos