2020
DOI: 10.1007/s11042-020-09892-5
|View full text |Cite
|
Sign up to set email alerts
|

Block cipher’s nonlinear component design by elliptic curves: an image encryption application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
23
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 25 publications
(23 citation statements)
references
References 51 publications
0
23
0
Order By: Relevance
“…𝐴 𝑖,𝑗 = 𝐴 𝛿 𝑖 ,𝛿 𝑗 (15) Where Step 3. Next, we will convert the entries of the matrix 𝐴 𝑠 by using the absolute function from the set in the range {−2 15 , 2 15−1 } to the elements of the Galois field 𝐺𝐹(2 15 ). Consequently, get a new matrix 𝐴 𝐺 .…”
Section: Proposed Algorithmmentioning
confidence: 99%
See 4 more Smart Citations
“…𝐴 𝑖,𝑗 = 𝐴 𝛿 𝑖 ,𝛿 𝑗 (15) Where Step 3. Next, we will convert the entries of the matrix 𝐴 𝑠 by using the absolute function from the set in the range {−2 15 , 2 15−1 } to the elements of the Galois field 𝐺𝐹(2 15 ). Consequently, get a new matrix 𝐴 𝐺 .…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…Step 4. Subsequently, convert the elements of the Galois field 𝐺𝐹(2 15 ) to the elements of the Galois field 𝐺𝐹(2 8 ) and Galois field 𝐺𝐹(2 7 ) by using the following map.…”
Section: Proposed Algorithmmentioning
confidence: 99%
See 3 more Smart Citations