198
Views
20
CrossRef citations to date
0
Altmetric
Original Articles

An enhanced chaotic key‐based RC5 block cipher adapted to image encryption

Pages 925-943 | Received 03 Sep 2010, Accepted 11 Nov 2011, Published online: 06 Mar 2012

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (4)

Z. Tabekoueng Njitacke, R. L. Tagne Mogue, G. D. Leutcho, T. Fonzin Fozin & J. Kengne. (2021) Heterogeneous multistability in a novel system with purely nonlinear terms. International Journal of Electronics 108:7, pages 1166-1182.
Read now
Viet–Thanh Pham, Christos Volos, Tomasz Kapitaniak, Sajad Jafari & Xiong Wang. (2018) Dynamics and circuit of a chaotic system with a curve of equilibrium points. International Journal of Electronics 105:3, pages 385-397.
Read now
Yuejun Zhang, Pengjun Wang, Xuelong Zhang, Xinqian Weng & Zhiyi Yu. (2016) A PUFs-based hardware authentication BLAKE algorithm in 65 nm CMOS. International Journal of Electronics 103:6, pages 1056-1066.
Read now
Jinn-Tsong Tsai & Po-Yuan Yang. (2015) PCA-LBG-based algorithms for VQ codebook generation. International Journal of Electronics 102:4, pages 529-547.
Read now

Articles from other publishers (16)

Iram Sabha, Shabir A. Parah, Parsa Sarosh & Malik Obaid Ul Islam. (2023) CESCAL: A joint compression-encryption scheme based on convolutional autoencoder and logistic map. Multimedia Tools and Applications 83:11, pages 32069-32098.
Crossref
Melih Yildirim. (2022) Optical color image encryption scheme with a novel DNA encoding algorithm based on a chaotic circuit. Chaos, Solitons & Fractals 155, pages 111631.
Crossref
Osama S. Faragallah, Ibrahim F. Elashry, Ahmed AlGhamdi, Walid El-Shafai, S. El-Rabaie, Fathi E. Abd El-Samie, Hala S. El-sayed & Mohamed A. Elaskily. (2022) Improved RC6 Block Cipher Based on Data Dependent Rotations. Computers, Materials & Continua 70:1, pages 1921-1934.
Crossref
Mangal Deep Gupta & R. K. Chauhan. (2021) Efficient Hardware Implementation of Pseudo-Random Bit Generator Using Dual-CLCG Method. Journal of Circuits, Systems and Computers 30:10, pages 2150182.
Crossref
Osama S. Faragallah, Hala S. El-sayed, Ashraf Afifi & S. F. El-Zoghdy. (2021) Small Details Gray Scale Image Encryption Using RC6 Block Cipher. Wireless Personal Communications 118:2, pages 1559-1589.
Crossref
Ajay Kakkar. (2020) A survey on secure communication techniques for 5G wireless heterogeneous networks. Information Fusion 62, pages 89-109.
Crossref
K Vivek Raj, H Ankitha, N G Ankitha & L S Kanthi Hegde. (2020) Honey Encryption based Hybrid Cryptographic Algorithm:A Fusion Ensuring Enhanced Security. Honey Encryption based Hybrid Cryptographic Algorithm:A Fusion Ensuring Enhanced Security.
F. J. Farsana & K. Gopakumar. (2020) Speech Encryption Algorithm Based on Nonorthogonal Quantum State with Hyperchaotic Keystreams. Advances in Mathematical Physics 2020, pages 1-12.
Crossref
Romana Shahzadi, Syed Muhammad Anwar, Farhan Qamar, Mudassar Ali & Joel J. P. C. Rodrigues. (2019) Chaos Based Enhanced RC5 Algorithm for Security and Integrity of Clinical Images in Remote Health Monitoring. IEEE Access 7, pages 52858-52870.
Crossref
Excel B. Villanueva, Ruji P. Medina & Bobby D. Gerardo. (2018) An enhanced RC5 (ERC5) algorithm based on simple random number key expansion technique. An enhanced RC5 (ERC5) algorithm based on simple random number key expansion technique.
Osama S. Faragallah. (2018) Optical double color image encryption scheme in the Fresnel-based Hartley domain using Arnold transform and chaotic logistic adjusted sine phase masks. Optical and Quantum Electronics 50:3.
Crossref
Osama S. Faragallah & Ashraf Afifi. (2017) Optical color image cryptosystem using chaotic baker mapping based-double random phase encoding. Optical and Quantum Electronics 49:3.
Crossref
Osama S. Faragallah. (2016) Transmission of DWT Block-Based KLT Watermarked Images Through MC-CDMA Wireless Channel. Wireless Personal Communications 90:3, pages 1387-1404.
Crossref
El-Sayed M. El-Alfy. 2016. Improving Information Security Practices through Computational Intelligence. Improving Information Security Practices through Computational Intelligence 74 98 .
Osama S. Faragallah. (2014) Efficient confusion?diffusion chaotic image cryptosystem using enhanced standard map. Signal, Image and Video Processing 9:8, pages 1917-1926.
Crossref
Suying Sheng & Xinhua Wu. (2012) A new digital anti-counterfeiting scheme based on chaotic cryptography. A new digital anti-counterfeiting scheme based on chaotic cryptography.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.