Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps.
George TeseleanuPublished in: ICISSP (2024)
Keyphrases
- security analysis
- image encryption scheme
- image encryption
- chaotic maps
- encryption scheme
- security requirements
- private key
- public key
- smart card
- image encryption algorithm
- authentication protocol
- user authentication
- authentication scheme
- data sharing
- encryption algorithm
- standard model
- secret key
- secret sharing scheme
- ciphertext
- lossless compression