Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3069591
Abstract: The advancement in wireless communication has encouraged the process of data transferring through the Internet. The process of data sharing via the Internet is prone to several attacks. The sensitive information can be protected from…
read more here.
Keywords:
dynamic substitution;
suggested scheme;
image encryption;
encryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "PeerJ Computer Science"
DOI: 10.7717/peerj-cs.587
Abstract: The biggest challenge for symmetric cryptosystems is to replace their static substitution with dynamic substitution, because static substitution S-boxes make the symmetric block ciphers more vulnerable to attacks. Previous well-known dynamic key-dependent S-boxes are lacking…
read more here.
Keywords:
substitution method;
method;
dynamic substitution;
substitution ... See more keywords