Author of the publication

A group theoretic construction of highly nonlinear substitution box and its applications in image encryption.

, , , , and . Multim. Tools Appl., 81 (3): 4163-4184 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure and efficient key agreement framework for critical energy infrastructure using mobile device., , , , , and . Telecommun. Syst., 78 (4): 539-557 (2021)Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos., , , , , and . Symmetry, 10 (7): 266 (2018)Breaking an image encryption scheme based on chaotic synchronization phenomenon., , and . IC3, page 1-4. IEEE Computer Society, (2016)LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things., , , , and . IEEE Access, (2024)Toward Spectrum Efficiency and Reliability for Heterogeneous Users in CR-Enabled Social Internet of Things., , , , , , , and . IEEE Access, (2023)A Multi-Level Blocks Scrambling Based Chaotic Image Cipher., and . IC3 (1), volume 94 of Communications in Computer and Information Science, page 171-182. Springer, (2010)On the Security of Chaos-Based Watermarking Scheme for Secure Communication., and . FICTA (1), volume 515 of Advances in Intelligent Systems and Computing, page 313-321. Springer, (2016)A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique., , and . SNDS, volume 420 of Communications in Computer and Information Science, page 540-550. Springer, (2014)A Bio-Chaotic Block Cryptosystem for Privacy Protection of Multimedia Data., , and . FICTA, volume 247 of Advances in Intelligent Systems and Computing, page 527-534. Springer, (2013)Trust-Enabled Energy Efficient Protocol for Secure Remote Sensing in Supply Chain Management., , and . IEEE Access, (2024)