Search Results - "Shishko, M. S."
-
1
Hashing technique based on SHA-3 using chaotic maps1
Published in Informatika (Minsk, Belarus) (29-03-2020)“…New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing…”
Get full text
Journal Article -
2
Image encryption using dna-sequences, chaotic dynamics and hash fuctions
Published in Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki (01-06-2019)“…An image encryption algorithm based on DNA-sequences, chaotic dynamics and hash functions is described. It is evaluated the resistance of the investigated…”
Get full text
Journal Article -
3
ENCRYPTION OF IMAGES ON THE BASIS OF CHAOTIC MAPPING AND PARALLEL COMPUTING
Published in Informatika (Minsk, Belarus) (01-12-2017)“…The chaos-based image encryption algorithm using parallel computing is described. To reduce the amount of encrypted data the wavelet-based compression is used…”
Get full text
Journal Article