Login / Signup
An Efficient Generation and Security Analysis of Substitution Box Using Fingerprint Patterns.
Öznur Sengel
Muhammed Ali Aydin
Ahmet Sertbas
Published in:
IEEE Access (2020)
Keyphrases
</>
security analysis
public key
smart card
security model
security requirements
high security
security properties
image encryption
encryption scheme
authentication protocol
encryption algorithm
data structure
proxy signature scheme
frequent patterns