![]() Inf Sci 450:378–391 (2018)Įssaid M, Akharraz I, Saaidi A, Mouhib A (2019) Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. Karati A, Islam SKH, Biswas GP (2018) A pairing-free and provably secure certificate less signature scheme. He D, Chen J, Zhang R (2012) An efficient and provably-secure certificate less signature scheme without bilinear pairings. Xiong H, Guan Z, Chen Z, Li F (2014) An efficient certificate less aggregate signature with constant pairing computation. Zhang L, Zhang F (2009) A new certificate less aggregate signature scheme. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic. If what you need is the source code, you will need to ask the author of the package for it, but do not be. ![]() pcoded (.p) files do not have any usable source code in them. Even emacs if you must -) Your difficulty will be in making any sense out of the file after you open it. Please follow this order while running the programs. Before running the code put the audio file to be encrypted in the same directory as the code files and change the first line of the file 'encryption.m' to match the file name of the audio file to be encrypted. ![]() Hua ZY, Zhou YC, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. You can use any good-quality editor that supports binary files. MATLAB program to encrypt/decrypt audio files using RSA. Bol Soc Paran Mat 37(3):75–83īoulbot A, Chillali A, Mouhib A (2020) Elliptic curves over the ring R. Zeriouh M, Chillali A, Boua A (2019) Cryptography based on the matrices. IEEE Trans Inf TheoryĬhillali S, Oughdir L (2019) A diagram of confidentiality of information during a traffic offence. Diffie W, Hellman M (1976) New directions in cryptography.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |