
| index | Title |
| 1 | How to repair the Hill cipher Author(s):ISMAIL I.A., AMIN Mohammed, DIAB H... Clicked:6712 Download:5824 Cited:5 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.12 P.2022-2030 DOI:10.1631/jzus.2006.A2022 |
| 2 | Comments on “How to repair the Hill cipher” Author(s):Y. RANGEL-ROMERO, R. VEGA-GARC&Iac... Clicked:7411 Download:4485 Cited:5 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.2 P.211-214 DOI:10.1631/jzus.A072143 |
| 3 | Decryption of pure-position permutation algorithms Author(s):ZHAO Xiao-yu, CHEN Gang, ZHANG Dan... Clicked:6079 Download:3583 Cited:5 <Full Text> Journal of Zhejiang University Science 2004 Vol.5 No.7 P.803-809 DOI:10.1631/jzus.2004.0803 |
| 4 | Performance study of selective encryption in comparison to full encryption for still visual images Author(s):Osama A. Khashan, Abdullah M. Zin,... Clicked:11635 Download:5297 Cited:6 <Full Text> <PPT> 2806 Journal of Zhejiang University Science C 2014 Vol.15 No.6 P.435-444 DOI:10.1631/jzus.C1300262 |
| 5 | A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DN... Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan... Clicked:8719 Download:11601 Cited:0 <Full Text> <PPT> 2498 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.866-879 DOI:10.1631/FITEE.1900709 |
| 6 | Discrete fractional watermark technique Author(s):Zai-rong Wang, Babak Shiri, Dumitr... Clicked:7741 Download:7342 Cited:0 <Full Text> <PPT> 2377 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.880-883 DOI:10.1631/FITEE.2000133 |
| 7 | Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Author(s):S. Aashiq Banu, Rengarajan Amirtha... Clicked:8852 Download:7986 Cited:0 <Full Text> <PPT> 2588 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.7 P.940-956 DOI:10.1631/FITEE.2000071 |
| 8 | TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion Author(s):Xiuli CHAI, Xiuhui CHEN, Yakun MA,... Clicked:4691 Download:5317 Cited:0 <Full Text> <PPT> 1220 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.8 P.1169-1180 DOI:10.1631/FITEE.2200498 |
| 9 | A geographic information encryption system based on Chaos-LSTM and chaos sequence proliferation Author(s):Jia DUAN, Luanyun HU, Qiumei XIAO,... Clicked:4100 Download:4692 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.3 P.427-440 DOI:10.1631/FITEE.2300755 |
| 10 | SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG... Clicked:2145 Download:4256 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.847-861 DOI:10.1631/FITEE.2400721 |