Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,878 papers from all fields of science
Search
Sign In
Create Free Account
Confusion and diffusion
Known as:
Diffusion (cryptography)
, Confusion (cryptography)
, Diffusion and confusion
Expand
In cryptography, confusion and diffusion are two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Algorithmic information theory
Avalanche effect
Bent function
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Encryption and hash based security in Internet of Things
B. Vinayaga Sundaram
,
M. Ramnath
,
M. Prasanth
,
J. Varsha Sundaram
3rd International Conference on Signal Processing…
2015
Corpus ID: 15089331
The Internet of Things (IoT) promises to be the next big revolution of the World Wide Web. It has a very wide range of…
Expand
2014
2014
Evaluation of root water uptake in the ISBA-A-gs land surface model using agricultural yield statistics over France
Nicolas Canal
,
J. Calvet
,
B. Decharme
,
D. Carrer
,
S. Lafont
,
Grégoire Pigeon
2014
Corpus ID: 49568181
The simulation of root water uptake in land surface models is affected by large uncertainties. The difficulty in mapping soil…
Expand
Highly Cited
2013
Highly Cited
2013
Application of S-box and chaotic map for image encryption
I. Hussain
,
T. Shah
,
M. Gondal
Mathematical and computer modelling
2013
Corpus ID: 9682731
2011
2011
A wheel-switch chaotic system for image encryption
Yue Wu
,
J. Noonan
,
S. Agaian
Proceedings International Conference on System…
2011
Corpus ID: 12649466
Because of high sensitivity for initial values and random-like behaviors, chaotic systems are widely used in image encryption…
Expand
2011
2011
Study on Chaotic Cryptosystem for Digital Image Encryption
Jia Li
,
Li Gan
Third International Conference on Measuring…
2011
Corpus ID: 18218857
Nowadays many image cryptosystems have been shown to be insecure. In this paper we present a new cryptosystem based on the…
Expand
Highly Cited
2010
Highly Cited
2010
Analysis and improvement of a chaos-based Hash function construction
Shaojiang Deng
,
Yantao Li
,
D. Xiao
2010
Corpus ID: 62559755
2009
2009
Catastrophic phase transitions and early warnings in a spatial ecological model
Ariel Fernandez
,
Hugo Fort
2009
Corpus ID: 15599860
Gradual changes in exploitation, nutrient loading, etc produce shifts between alternative stable states (ASS) in ecosystems which…
Expand
2004
2004
Influence of benthic organisms on solute transport in lake sediments
K. Rees
,
K. R. Reddy
,
P. Rao
Hydrobiologia
2004
Corpus ID: 25026163
Increased inputs of nutrients into the waters of Lake Okeechobee has raised concern that the lake is becoming hypereutrophic. One…
Expand
Highly Cited
1969
Highly Cited
1969
Diffusion of sulfur in gallium phosphide and gallium arsenide
A. Young
,
G. L. Pearson
1969
Corpus ID: 97960183
1967
1967
DEVELOPMENT, DIFFUSION, AND EVALUATION.
E. Guba
1967
Corpus ID: 151010641
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE