2019
DOI: 10.1016/j.jksuci.2017.10.002
|View full text |Cite
|
Sign up to set email alerts
|

κ-Lookback random-based text encryption technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…We conduct experiments on both English and Chinese corpus. As described in [53], the correlation is measured by…”
Section: Using Time-varying Codebookmentioning
confidence: 99%
“…We conduct experiments on both English and Chinese corpus. As described in [53], the correlation is measured by…”
Section: Using Time-varying Codebookmentioning
confidence: 99%
“…into two halves. 1 The left half bits create an index x for the row of D-Box −1 and the right half bits create an index y for the column of D-Box −1 . On the other hand, the 4 bits that represent r and the 4 bits that represent c are concatenated rc to create a unicode symbols t. The unicode symbol t is placed in the index (x, y) of D-Box −1 .…”
Section: A the D-box And Its Inverse D-box −1mentioning
confidence: 99%
“…2) STEP II: In this step, the last 32 bytes (out of 176) of the sequence generated by Step I are used as a seed for the key-based number generator, which is described in [1]. Fig.…”
Section: ) Step Imentioning
confidence: 99%
See 2 more Smart Citations