Login / Signup
Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map.
Guanwen Shi
Simin Yu
Qianxue Wang
Published in:
Entropy (2022)
Keyphrases
</>
security analysis
image encryption
image encryption algorithm
public key
smart card
security requirements
encryption algorithm
user authentication
encryption scheme
authentication scheme
private key
real time
authentication protocol
low cost
information security