To search, Click below search items.
All Published Papers Search Service
Title
Color Image Encryption using 3D Chaotic Map with AES key Dependent S-Box
Author
Ashwak Mahmmod Alabaichi
Vol. 16 No. 10 pp. 105-115
Keywords
Chaotic map, 2D Arnold Cat Map, 3D logistic map, 3D Chebyshev map, AES key Dependent S-Boxes, NPCR, UACI, Correlation Confection, Information Entropy, Histogram, MES, and Key sensitivity analysis.
Domineering Analysis & Mitigation of IP-SEC VPN Using GNS3
Engr. Maria Abdullah and Najeed Ahmed Khan
Vol. 17 No. 4 pp. 245-250
VPN IP Security ICMP TCP SHA1 AES algorithm.
Power-based Side-Channel Analysis Against AES Implementations: Evaluation and Comparison
Noura Benhadjyoussef, Mouna Karmani and Mohsen Machhout
Vol. 21 No. 4 pp. 264-271
Power analysis (CPA); Advanced Encryption Standard (AES); correlation coefficient; power model; AES implementation.
Personal Data Security in Recruitment Platforms
Alya¡¯a Bajoudah and Hatim AlSuwat
Vol. 22 No. 6 pp. 310-318
Personal data , Hybrid cryptography , AES , Twofish, RSA..