index | Title |
1 | How to repair the Hill cipher Author(s):ISMAIL I.A., AMIN Mohammed, DIAB Hossam Clicked:5573 Download:4752 Cited:5 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.12 P.2022-2030 DOI:10.1631/jzus.2006.A2022 |
2 | Comments on “How to repair the Hill cipher” Author(s):Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ Clicked:5698 Download:3754 Cited:5 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.2 P.211-214 DOI:10.1631/jzus.A072143 |
3 | Decryption of pure-position permutation algorithms Author(s):ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang Clicked:5107 Download:2981 Cited:5 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.7 P.803-809 DOI:10.1631/jzus.2004.0803 |
4 | Performance study of selective encryption in comparison to full encryption for still visual images Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan Clicked:9460 Download:3788 Cited:6 <Full Text> <PPT> 2087 Journal of Zhejiang University Science C 2014 Vol.15 No.6 P.435-444 DOI:10.1631/jzus.C1300262 |
5 | ImgFS: a transparent cryptography for stored images using a filesystem in userspace Author(s):Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan Clicked:6782 Download:3071 Cited:0 <Full Text> <PPT> 2287 Frontiers of Information Technology & Electronic Engineering 2015 Vol.16 No.1 P.28-42 DOI:10.1631/FITEE.1400133 |
6 | A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu Clicked:6562 Download:8353 Cited:0 <Full Text> <PPT> 1693 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.866-879 DOI:10.1631/FITEE.1900709 |
7 | Discrete fractional watermark technique Author(s):Zai-rong Wang, Babak Shiri, Dumitru Baleanu Clicked:5739 Download:5074 Cited:0 <Full Text> <PPT> 1654 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.880-883 DOI:10.1631/FITEE.2000133 |
8 | Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Author(s):S. Aashiq Banu, Rengarajan Amirtharajan Clicked:6126 Download:5362 Cited:0 <Full Text> <PPT> 1838 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.7 P.940-956 DOI:10.1631/FITEE.2000071 |
9 | A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Author(s):Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE Clicked:2333 Download:7855 Cited:0 <Full Text> <PPT> 504 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.7 P.1045-1061 DOI:10.1631/FITEE.2200372 |
10 | TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion Author(s):Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG Clicked:2346 Download:2211 Cited:0 <Full Text> <PPT> 484 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.8 P.1169-1180 DOI:10.1631/FITEE.2200498 |
11 | A geographic information encryption system based on chaos-LSTM and chaos sequence proliferation Author(s):Jia DUAN, Luanyun HU, Qiumei XIAO, Meiting LIU, Wenxin YU Clicked:1109 Download:517 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering In Press DOI: |
12 | SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key Author(s):Ming LI, Wenwen ZHOU, Mengdie WAN, Yushu ZHANG, Yong XIANG Clicked:110 Download:67 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering In Press DOI: |