Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
7
Page No.
1707 - 1712
References
Agarwal, S. and A. Negi, 2014. A key agreement protocol based on superior fractal sets. J. Math. Comput. Sci., 4: 471-478.
Direct Link | Al-Saidi, N.M. and M.S. Rushdan, 2009. Using IFS as an encryption method. Proceedings of the International Conference on Education Technology and Computer (ICETC'09), April 17-20, 2009, IEEE, Singapore, ISBN:978-0-7695-3609-5, pp: 275-278.
Alia, M. and A. Samsudin, 2007. A new public-key cryptosystem based on mandelbrot and julia fractal sets. Asian J. Inf. Technol., 6: 567-575.
Direct Link | Alia, M. and A. Samsudin, 2007. New key exchange protocol based on Mandelbrot and Julia fractal sets. Intl. J. Comput. Sci. Netw. Secur., 7: 302-307.
Direct Link | Alia, M.A. and A.B. Samsudin, 2017. Generalized scheme for fractal based digital signature (GFDS). Intl. J. Comput. Sci. Netw. Secur., 7: 99-104.
Buchmann, J., 2004. Introduction to Cryptography. 2nd Edn., Springer, USA., ISBN: 978-0-387-21156-5, Pages: 335.
Falconer, K., 2004. Fractal Geometry: Mathematical Foundations and Applications. 2nd Edn., John Wiley & Sons, Hoboken, New Jersey, USA., Pages: 329.
Kocarev, L. and Z. Tasev, 2003. Public-key encryption based on Chebyshev maps. Proceedings of the 2003 International Symposium on Circuits and Systems (ISCAS'03) Vol. 3, May 25-28, 2003, IEEE, Bangkok, Thailand, pp: 3-3.
Lock, A.J.J., C.H. Loh, S.H. Juhari and A. Samsudin, 2010. Compression-encryption based on fractal geometric. Proceedings of the 2nd International Conference on Computer Research and Development, May 7-10, 2010, IEEE, Kuala Lumpur, Malaysia, ISBN:978-0-7695-4043-6, pp: 213-217.
Mandelbrot, B.B., 1967. How long is the coast of Britain? Statistical self-similarity and fractal dimension. Science, 156: 636-638.
Direct Link | Mandelbrot, B.B., 1982. The Fractal Geometry of Nature. W. H. Freeman and Company, New York, USA., ISBN:9780716711865, Pages: 468.
Menezes, A.J., P.C.V. Oorschot and S.A. Vanstone, 1996. Handbook of Applied Cryptography. CRC Press, Boca Raton, USA., ISBN-13:978-0-84-938523-0, Pages: 755.
Peitgen, H.O. and P.H. Richter, 2013. The Beauty of Fractals: Images of Complex Dynamical Systems. Springer, Berlin, Germany, ISBN-13:978-3-642-61719-5, Pages: 197.
Rozouvan, V., 2009. Modulo image encryption with fractal keys. Opt. Lasers Eng., 47: 1-6.
CrossRef | Direct Link | Seberry, J. and J. Pieprzyk, 1989. Cryptography: An Introduction to Computer Security. 2nd Edn., Prentice-Hall, Inc., Upper Saddle River, New Jersey, USA., ISBN:9780724802746, Pages: 375.
Stallings, W. and M.P. Tahiliani, 2014. Cryptography and Network Security: Principles and Practice. Pearson, London, UK.,.
Stinson, D.R., 2005. Cryptography: Theory and Practice. 3rd Edn., CRC Press, Boca Raton, Florida, USA., ISBN:978-1-58488-508-5, Pages: 583.
Sun, Y., L. Chen, R. Xu and R. Kong, 2014. An image encryption algorithm utilizing Julia sets and Hilbert curves. PloS. One, 9: e84655-1-e84655-9.
PubMed | Direct Link | Sun, Y.Y., R.Q. Kong, X.Y. Wang and L.C. Bi, 2010. An image encryption algorithm utilizing Mandelbrot set. Proceedings of the International Workshop on Chaos-Fractals Theories and Applications (IWCFTA’10), October 29-31, 2010, IEEE, Kunming, Yunnan, China, ISBN:978-1-4244-8815-5, pp: 170-173.