Author of the publication

A new construction of bent functions based on $$Z$$ -bent functions.

, , , and . Des. Codes Cryptogr., 66 (1-3): 243-256 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A high capacity multi-image steganography technique based on golden ratio and non-subsampled contourlet transform., , , and . Multim. Tools Appl., 81 (17): 24449-24476 (2022)Security of medical images based on special orthogonal group and Galois field., , and . Multim. Tools Appl., 82 (28): 44277-44308 (November 2023)Security of Digital Images Based on 3D Arnold Cat Map and Elliptic Curve., , and . Int. J. Image Graph., 21 (1): 2150006:1-2150006:26 (2021)Securing Digital Images using Stream Cipher and MDS Matrix., , and . SN Comput. Sci., 2 (6): 462 (2021)Few-detail image encryption algorithm based on diffusion and confusion using Henon and Baker chaotic maps., , , and . Soft Comput., 28 (4): 2851-2861 (February 2024)Security of Digital Images Based on Stream Cipher and MDS Matrix., , and . CVIP (1), volume 1376 of Communications in Computer and Information Science, page 113-125. Springer, (2020)6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates., , , , , , , , , and . IEEE Access, (2021)A new construction of bent functions based on $$Z$$ -bent functions., , , and . Des. Codes Cryptogr., 66 (1-3): 243-256 (2013)A technique for securing digital audio files based on rotation and XOR operations., and . Soft Comput., 28 (6): 5523-5540 (March 2024)A Technique for Securing Multiple Digital Images Based on 2D Linear Congruential Generator, Silver Ratio, and Galois Field., , , , , , , and . IEEE Access, (2021)