2012
DOI: 10.1504/ijesdf.2012.045388
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using HC-128 and HC-256 stream ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…Let X t and X t , respectively, be the original data and the reconstructed data in the controllers. The MAE and MRE for the two data matrices are [29]…”
Section: A Experimental Setupmentioning
confidence: 99%
“…Let X t and X t , respectively, be the original data and the reconstructed data in the controllers. The MAE and MRE for the two data matrices are [29]…”
Section: A Experimental Setupmentioning
confidence: 99%
“…Despite having HC-128 and HC-256 stream ciphers available to research community, there are no known hardware implementation efforts using this cipher. However, there is one interesting paper that uses the HC-256 stream cipher for image encryption, which can be found in the paper by Jolfaei et al (2012).…”
Section: Hc-256mentioning
confidence: 99%
“…In Mirghadri (2010b, 2010c) and Jolfaei et al (2012aJolfaei et al ( , 2012b, Jolfaei et al investigated the application of fast stream ciphers, including A5/1 (Ekdahl and Johansson, 2003), W7 (Jolfaei and Mirghadri, 2010b) and some of the eSTREAM finalists, such as Salsa20 (Bernstein, 2008a) and HC (Wu, 2008a), for the syntax-aware image encryption. These ciphers work on binary streams.…”
Section: Related Workmentioning
confidence: 99%