Confusion and diffusion

Known as: Diffusion (cryptography), Confusion (cryptography), Diffusion and confusion 
In cryptography, confusion and diffusion are two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1962-2018
010203019622018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Physical layer security is of key interest for secure passive optical networks (PONs). We propose a hybrid chaotic confusion and… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2015
2015
Recent research advances have revealed the computational secrecy of the compressed sensing (CS) paradigm. Perfect secrecy can… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2013
2013
This paper argues that IS theories should not ignore or background the relationship between individuals and technologies in… (More)
Is this relevant?
2012
2012
Tensors of various orders can be used for modeling physical quantities such as strain and diffusion as well as curvature and… (More)
  • figure 2.1
  • figure 3.1
  • figure 3.2
  • figure 3.3
  • figure 4.1
Is this relevant?
2012
2012
In present age chaos based cryptosystem has gained attention in research of information security and number of chaos based image… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2008
2008
Most block-cipher image encryption schemes based on chaos theory have independent modules for confusion and diffusion processes… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 2
  • figure 5
Is this relevant?
2006
2006
Perceptual hash functions have been recently proposed as cryptographic primitives for multimedia security applications. However… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In recent years, a variety of effective chaos-based image encryption schemes have been proposed. The typical structure of these… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2004
2004
The social inhibition of helping is well documented, and this phenomenon has been explained in terms of the general processes of… (More)
  • table 1
Is this relevant?
1962
1962
Experimental studies of double injection (DI) negative resistance phenomena in GaAs, Si, and Ge are presented. V-I… (More)
Is this relevant?