Login / Signup
Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication.
Jasra Bhat
Manasha Saqib
Ayaz Hassan Moon
Published in:
Int. J. Syst. Assur. Eng. Manag. (2022)
Keyphrases
</>
image encryption
elliptic curve cryptography
authentication scheme
high security
security analysis
cryptographic algorithms
smart card
encryption algorithm
user authentication
public key
authentication protocol
secret key
security model
computer simulation
digital signature