Sciweavers

16 search results - page 4 / 4
» New Birthday Attacks on Some MACs Based on Block Ciphers
Sort
View
IVC
2006
156views more  IVC 2006»
13 years 5 months ago
Image encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques.Inthis communication,weproposea ...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud