1 |
Y. P. K. Nkandeu, A. Tiedeu, and Hill L., "Cryptography in an algebraic alphabet," American Mathematical Monthly, vol. 1929, no. 36, pp. 306-312, 2019.
|
2 |
Y.P.K. Nkandeu and A. Tiedeu, "An image encryption algorithm based on substitution technique and chaos mixing," Multimedia Tools and Applications, vol. 78, no. 8, pp. 10013-10034, 2019.
DOI
|
3 |
A. Jarjar, "Improvement of hill's classical method in image cryptography," International Journal of statistics and Applied Mathematics, vol. 2, no. 3, Part A, 2017.
|
4 |
Lin CH, Lee CY, Lee C. Y., "Comments on Saeednia's improved scheme for the Hill cipher," Journal of the Chinese Institute of Engineers, vol. 27, no. 5, pp. 743-746, 2004.
DOI
|
5 |
Bibhudendra Acharya1, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, "Image encryption using advanced Hill cipher algorithm," International Journal of Recent Trends in Engineering and Technology, vol. 1, no. 1, 2009.
|
6 |
C. Fu, G. Y. Zhang, M. Zhu, Z. Chen, and W. M. Lei, "A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy," Security and Communication Networks, vol. 2018, pp. 1-13, 2018.
|
7 |
Chang'e Dong, "Color image encryption using one-time keys and couple chaotic systems," Signal Processing: image Communication, vol. 29, no. 5, pp. 628-640, 2014.
DOI
|
8 |
Xing-Yuan Wang, Sheng-Xian Gu, and Ying-Qian Zhang, "Novel image encryption algorithm based on cycle shift and chaotic system," Optics and Lasers in Engineering, vol. 68, pp. 126-134, 2015.
DOI
|
9 |
Abdellatif JarJar, "Improvement of Feistel method and the new encryption scheme," Optik, vol. 157, pp. 1319-1324, 2018.
DOI
|
10 |
S. Hraoui, F. Gmira, A. O. Jarar, K. Satori, A. Saaidi, "Benchmarking AES and chaos based logistic map for image encryption," in Proceeding of ACS International Conference Computer Systems and Applications (AICCSA), 2013.
|
11 |
M. Essaid, I. Akharraz, and A. Saaidi, "Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps," Journal of Information Security and Applications, vol. 47, pp. 173-187, 2019.
DOI
|
12 |
Yong Wang, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang, and Guanrong Chen, "A chaos-based image encryption algorithm with variable control parameters," Chaos, Solitons & Fractals, vol. 41, no. 4, pp. 1773-1783, 2009.
DOI
|
13 |
Pand uranga and S. Naveen Kumar, "Advanced partial image encryption using two-stage Hill cipher technique," International Journal of Computer Applications, vol. 60, no.16, pp. 14-19, 2012.
DOI
|
14 |
Rifaat Zaidan Khalaf and Alharith Abdulkareem Abdullah, "Novel quantum encryption algorithm based on multiqubit quantum shift register and Hill cipher," Advances in High Energy Physics, vol. 2014, Article ID 104325, pp. 1-5, 2014.
|
15 |
Rajwant Kaur, S. A. Khan, and Simranjit Kaur, "An efficient image encryption using DNA cryptography and reversible cellular automata," International Journal of Computer Applications, vol. 182, no. 24, pp. 32-38, 2018.
DOI
|
16 |
Jan Sher Khan and J. Ahmad, "Chaos based efficient selective image encryption" Multidimensional Systems and Signal Processing, vol. 30, pp. 943-961, 2019.
DOI
|