Author of the publication

Breaking a Chaotic Image Encryption Algorithm Based on Modulo Addition and XOR Operation.

, , , and . I. J. Bifurcation and Chaos, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps., , , , and . I. J. Bifurcation and Chaos, (2015)Prediction and Validation of Disease Genes Using HeteSim Scores., , , and . IEEE/ACM Trans. Comput. Biology Bioinform., 14 (3): 687-695 (2017)WebTraceMiner: a web service for processing and mining EST sequence trace files., , , , , , , , and . Nucleic Acids Research, 35 (Web-Server-Issue): 137-142 (2007)On the security of a class of diffusion mechanisms for image encryption., , , , , , and . CoRR, (2015)Breaking a RGB image encryption algorithm based on DNA encoding and chaos map.. CoRR, (2013)A deep learning ensemble approach to prioritize antiviral drugs against novel coronavirus SARS-CoV-2 for COVID-19 drug repurposing., , and . Appl. Soft Comput., 113 (Part): 107945 (2021)Cryptanalyzing an image encryption algorithm based on scrambling and Veginere cipher., , , , and . CoRR, (2014)Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation, , , and . CoRR, (2012)Breaking an image compression and encryption scheme based on Chinese Remainder Theorem., , , and . CoRR, (2013)Breaking a novel image encryption scheme based on improved hyperchaotic sequences, , and . CoRR, (2012)