Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.
George TeseleanuPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- image encryption
- security analysis
- image encryption scheme
- high security
- encryption algorithms
- smart card
- encryption algorithm
- encryption scheme
- public key
- security requirements
- authentication scheme
- user authentication
- authentication protocol
- private key
- elliptic curve cryptography
- ciphertext
- access control policies