Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps.
George TeseleanuPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- security analysis
- image encryption scheme
- chaotic maps
- image encryption
- encryption scheme
- security requirements
- public key
- smart card
- standard model
- authentication scheme
- authentication protocol
- user authentication
- image encryption algorithm
- private key
- data sharing
- encryption algorithm
- secret sharing scheme
- secret key
- digital signature
- ciphertext
- security mechanisms
- sensitive data