scrambling transformation
Recently Published Documents


TOTAL DOCUMENTS

6
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

2014 ◽  
Vol 602-605 ◽  
pp. 2590-2595
Author(s):  
Ling Xiong ◽  
Yang Su

This paper provides a complete solution for bus security protection of cipher SoC chip from the technology of bus security protection. The structure has a scrambling transformation on the data bus of whole cipher chip with the word oriented stream cipher algorithm, and has a scrambling transformation on the address bus of memory cells especially the EFlash with more efficient Benes permutation network. Relative to the cipher SoC chip, the scrambling transformation is transparent and can ensure the security of information transferred on the bus, improve the efficiency of bus scrambling, reduce the area overhead at the same time.


2012 ◽  
Vol 500 ◽  
pp. 465-470 ◽  
Author(s):  
Hong Ye Zhang ◽  
Run Hui Wang

An image encryption technology based on multi-dimension chaotic system, spatiotemporal chaotic theory and traditional symmetric encryption algorithm is presented. The scrambling transformation was completed with multi-dimension chaotic system first. Then spatiotemporal chaotic theory was used to deal with gray transformation for each pixel. DES Algorithm was applied to implement image encryption at last. Theoretical analyses and simulated experiment show that the proposed image encryption scheme provides perfect results, larger key space and higher security, so this encryption system has excellent performance against many kinds of attacks.


2011 ◽  
Vol 467-469 ◽  
pp. 231-235
Author(s):  
Hong Ye Zhang

An image encryption algorithm based on self-adaptive and chaos theory is presented. The scrambling transformation is completed with Logistic chaos and S-box first. Then self-adaptive image encryption scheme is used to deal with gray transformation for each pixel and image encryption is finished at last. Theoretical analyses and simulated experiment show that the proposed image encryption algorithm provides perfect results, larger key space, simple and easy to be implemented and fast running speed, so this encryption algorithm has excellent performance against many kinds of attacks and has strong practicality.


Sign in / Sign up

Export Citation Format

Share Document