ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
11
views
0
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,869
similar
All similar
Record
: found
Abstract
: found
Article
: found
Is Open Access
LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm
Author(s):
Hadia M.S. El Hennawy
,
Alaa E.A. Omar
,
Salah M.A. Kholaif
Publication date
Created:
March 2015
Publication date
(Print):
March 2015
Journal:
Ain Shams Engineering Journal
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Download
XML
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
The Criminology, Victimology and Security Journal
Author and article information
Journal
Title:
Ain Shams Engineering Journal
Abbreviated Title:
Ain Shams Engineering Journal
Publisher:
Elsevier BV
ISSN (Print):
20904479
Publication date Created:
March 2015
Publication date (Print):
March 2015
Volume
: 6
Issue
: 1
Pages
: 57-65
Article
DOI:
10.1016/j.asej.2014.08.001
SO-VID:
0106eb92-d23a-4dc3-b507-71a3a16b0422
Copyright ©
© 2015
License:
http://www.elsevier.com/tdm/userlicense/1.0/
http://creativecommons.org/licenses/by-nc-nd/3.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,869
Exploiting preprocessing-permutation–diffusion strategy for secure image cipher based on 3D Latin cube and memristive hyperchaotic system
Authors:
Xiuli Chai
,
Jiangyu Fu
,
Jitong Zhang
…
Midori : a block cipher for low energy (Extended Version)
Authors:
Twine: a lightweight, versatile block cipher
Authors:
Suzaki
See all similar
Cited by
3
An integer wavelet transform image steganography method based on 3D sine chaotic map
Authors:
Milad Yousefi Valandar
,
Milad Jafari Barani
,
Peyman Ayubi
…
CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
Authors:
Khan Muhammad
,
Jamil Ahmad
,
Naeem Ur Rehman
…
Design of a New Stream Cipher: PARS
Authors:
Mohammadreza Ashouri
See all cited by