Author of the publication

A secure hash function based on sponge construction and chaos-maps.

, , and . Int. J. Comput. Sci. Eng., 25 (3): 285-297 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes., , and . Inf. Secur. J. A Glob. Perspect., 32 (2): 59-75 (March 2023)Sécurité des Données en se basant sur le Chiffre de Hill., , , and . CIIA, volume 547 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)Lorenz's attractor applied to the stream cipher (Ali-Pacha generator), , , and . Chaos, Solitons & Fractals, 33 (5): 1762--1766 (August 2007)Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key., , and . Int. J. Inf. Priv. Secur. Integr., 4 (2): 79-93 (2019)Chaos Crypto-Système basé sur l'Attracteur de Hénon-Lozi., , , and . CIIA, volume 547 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)New chaotic cryptosystem for the image encryption., , and . Int. J. Inf. Comput. Secur., 12 (4): 450-463 (2020)Data security based on homographic function., , and . Pattern Recognit. Lett., (2020)Impact of Silent Periods on Pseudonym Schemes., , , , and . SSD, page 79-85. IEEE, (2021)A secure hash function based on sponge construction and chaos-maps., , and . Int. J. Comput. Sci. Eng., 25 (3): 285-297 (2022)A New Image Scrambling Technique Only With A Specific Permutation., , and . AI-CSP, page 1-14. IEEE, (2021)