News
Impact Statement: We theoretically propose a color image ... method for images privacy authentication in cloud. In our paper, after achieving chaos synchronization under proper parameters, two MC-SLs ...
State Key Laboratory of Electronic Thin Films and Integrated Devices, University of Electronic Science and Technology of China, Chengdu 610054, P. R. China Chongqing Institute of Microelectronics ...
some image encryption algorithms still have several security defects, and the research on cryptanalysis is relatively inadequate. This paper performs the cryptanalysis of a newly proposed color image ...
Pull requests help you collaborate on code with other people. As pull requests are created, they’ll appear here in a searchable and filterable list. To get started, you should create a pull request.
This project provides an implementation of AES encryption and decryption using the GCM (Galois/Counter Mode) mode of operation for secure data handling in Android applications. It allows you to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results