Now showing items 1-8 of 2
Chaos-based cryptosystem (2) |
Binary diffusion matrix (1) |
Confusion (1) |
Dependent permutation (1) |
Diffusion (1) |
Image encryption (1) |
New formulation of the 2D-cat map (1) |
Security analysis (1) |
Now showing items 1-8 of 2