<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-9044</journal-id>
<journal-title><![CDATA[Polibits]]></journal-title>
<abbrev-journal-title><![CDATA[Polibits]]></abbrev-journal-title>
<issn>1870-9044</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Innovación y Desarrollo Tecnológico en Cómputo]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-90442015000200008</article-id>
<article-id pub-id-type="doi">10.17562/PB-52-7</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Cipher Image Damage: An Application of Filters]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Flores-Carapia]]></surname>
<given-names><![CDATA[Rolando]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Silva-García]]></surname>
<given-names><![CDATA[Víctor Manuel]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Luna-Benoso]]></surname>
<given-names><![CDATA[Benjamín]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rentería-Márquez]]></surname>
<given-names><![CDATA[Carlos]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Instituto Politécnico Nacional Centro de Innovación y Desarrollo Tecnológico en Cómputo Department of Security]]></institution>
<addr-line><![CDATA[México Distrito Federal]]></addr-line>
<country>México</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Instituto Politécnico Nacional  ]]></institution>
<addr-line><![CDATA[México Distrito Federal]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2015</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2015</year>
</pub-date>
<numero>52</numero>
<fpage>67</fpage>
<lpage>78</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-90442015000200008&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-90442015000200008&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-90442015000200008&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[In this paper, color images are encrypted and subsequently damage occlusion is made to the encrypted figures, with different sizes; the intention is to simulate an attack. In this research, two aspects are discussed, namely: the first is to encrypt images with quality; that is, the figures encrypted pass randomness tests proposed in this paper. The second aspect deals with the problem of recovering the encrypted figure information when it has been damaged. To retrieve information from encrypted images, the enryption of images is carried out in two steps: in the first a permutation is applied to the entire image and the second uses the AES cryptosystem with variable permutations. To perform this task an algorithm is used that utilizes the pi number to generate the permutations. To improve the sharpness of the deciphered figures with damage two filters are applied; median and average. To measure the degree of improvement in the damaged images two tests are proposed; the first is the correlation coefficient between adjacent pixels in the horizontal, vertical and diagonal directions. The second is based on the information entropy.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[AES with variable permutations]]></kwd>
<kwd lng="en"><![CDATA[goodness-of-fit test]]></kwd>
<kwd lng="en"><![CDATA[fourier transform]]></kwd>
<kwd lng="en"><![CDATA[correlation]]></kwd>
<kwd lng="en"><![CDATA[entropy of information]]></kwd>
<kwd lng="en"><![CDATA[median and mean filters]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>Cipher Image Damage: An Application of Filters</b></font></p>  	    <p>&nbsp;</p>      <p align="center"><font face="verdana" size="2"><b>Rolando Flores&#45;Carapia<sup>1</sup>, V&iacute;ctor Manuel Silva&#45;Garc&iacute;a<sup>2</sup>, Benjam&iacute;n Luna&#45;Benoso<sup>2</sup> and Carlos Renter&iacute;a&#45;M&aacute;rquez<sup>2</sup></b></font></p>      <p>&nbsp;</p> 	    <p><font face="verdana" size="2"><i><sup>1</sup> Department of Security, CIDETEC, Instituto Polit&eacute;cnico Nacional, D.F., 07700, M&eacute;xico</i> (e-mail: <a href="mailto:rfloresca@ipn.mx">rfloresca@ipn.mx</a>).</font></p> 	    <p><font face="verdana" size="2"><i><sup>2</sup> Instituto Polit&eacute;cnico Nacional, M&eacute;xico.</i></font></p> 	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2">Manuscript received on May 11, 2015    <br> Accepted for publication on July 22, 2015    ]]></body>
<body><![CDATA[<br> Published on October 15, 2015</font></p>     <p align="justify">&nbsp;</p> 	    <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>  	    <p align="justify"><font face="verdana" size="2">In this paper, color images are encrypted and subsequently damage occlusion is made to the encrypted figures, with different sizes; the intention is to simulate an attack. In this research, two aspects are discussed, namely: the first is to encrypt images with quality; that is, the figures encrypted pass randomness tests proposed in this paper. The second aspect deals with the problem of recovering the encrypted figure information when it has been damaged. To retrieve information from encrypted images, the enryption of images is carried out in two steps: in the first a permutation is applied to the entire image and the second uses the AES cryptosystem with variable permutations. To perform this task an algorithm is used that utilizes the <i>pi</i> number to generate the permutations. To improve the sharpness of the deciphered figures with damage two filters are applied; median and average. To measure the degree of improvement in the damaged images two tests are proposed; the first is the correlation coefficient between adjacent pixels in the horizontal, vertical and diagonal directions. The second is based on the information entropy. </font></p>      <p align="justify"><font face="verdana" size="2"><b>Key words:</b> AES with variable permutations, goodness&#45;of&#45;fit test, fourier transform, correlation, entropy of information, median and mean filters.</font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/poli/n52/n52a8.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><b>REFERENCES</b></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; S. Baruah, V. Bonifaci, G. D'Angelo, H. Li, A. Marchetti&#45;Spaccamela, N. Megow, and L. Stougie, "Scheduling real&#45;time mixed&#45;criticality jobs," <i>IEEE Transactions on Computers,</i> vol. 61, no. 8, pp. 1140&#45;1152, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054278&pid=S1870-9044201500020000800001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; L. Xuemei, X. Tong, and L. Dai, "A novel scheme reality preserving image encryption," in <i>2011 Third International Conference Measuring Technology and Mechatronics Automation.</i> IEEE, 2011, pp. 218&#45;221.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054280&pid=S1870-9044201500020000800002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; J. Li and L. Gan, "Study on chaotic cryptosystem for digital image encryption," in <i>2011 Third International Conference Measuring Technology and Mechatronics Automation.</i> IEEE, 2011, pp. 426&#45;430.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054282&pid=S1870-9044201500020000800003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; C. Fu, J. Chen, H. Zou, W. Meng, Y. Zhan, and Y. Yu, "A chaos&#45;based digital image encryption scheme with an improved diffusion strategy," <i>Optics Express,</i> vol. 20, no. 3, pp. 2363&#45;78, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054284&pid=S1870-9044201500020000800004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; H. Zhu, C. Zhao, and X. Zhang, "A novel image encryption&#45;compression scheme using hyper&#45;chaos and chinese remainder theorem," <i>Signal Processing: Image Communication,</i> vol. 28, no. 6, pp. 670&#45;680, 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054286&pid=S1870-9044201500020000800005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; "Advanced encryption standard (AES)," 2001, FIPS PUB 197.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054288&pid=S1870-9044201500020000800006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; D. R. Stinson, <i>Cryptography: Theory and Practice.</i> Chapman &amp; Hall/ CRC Press, 2005.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054290&pid=S1870-9044201500020000800007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; M. Matsui, "Linear cryptanalysis method for DES cipher," <i>Lecture Notes in Computer Science,</i> vol. 765, pp. 386&#45;397, 1994.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054292&pid=S1870-9044201500020000800008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; E. Biham and A. Shamir, "Differential cryptanalysis of the full 16&#45;round DES," <i>Lecture Notes in Computer Science,</i> vol. 740, pp. 487&#45;496, 1993.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054294&pid=S1870-9044201500020000800009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; S. Keshari and S. G. Modani, "Color image encryption scheme based on 4&#45;weighted fractional fourier transform," <i>Journal of Electronic Imaging,</i> vol. 21, no. 3, pp. 033 018&#45;1&#45;6, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054296&pid=S1870-9044201500020000800010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; W. Chen, X. Chen, and C. Sheppard, "Optical color&#45;image encryption and synthesis using coherent diffractive imaging in the fresnel domain," <i>Optics Express,</i> vol. 20, no. 4, pp. 3853&#45;65, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054298&pid=S1870-9044201500020000800011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; P. Refregier and B. Javidi, "Optical image encryption based on input plane and fourier plane random encoding," <i>Optical Letters,</i> vol. 20, no. 7, pp. 767&#45;769, 1995.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054300&pid=S1870-9044201500020000800012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; W. Chen and X. Chen, "Double random phase encoding using phase reservation and compression," <i>Journal of Optics,</i> vol. 16, no. 2, pp. 025 402&#45;7, 2014.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054302&pid=S1870-9044201500020000800013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; W. Chen, B. Javidi, and X. Chen, "Advances in optical security system," <i>Advances in Optics and Photonics,</i> vol. 6, no. 2, pp. 120&#45;155, 2014.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054304&pid=S1870-9044201500020000800014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; Y. Wu, G. Yang, H. Jin, and J. P. Noonan, "Image encryption using the two&#45;dimensional logistic chaotic map," <i>Journal of Electronic Imaging,</i> vol. 21, no. 1, p. 013014, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054306&pid=S1870-9044201500020000800015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; V. M. Silva&#45;Garc&iacute;a, R. Flores&#45;Carapia, C. Renter&iacute;a&#45;Marquez, B. Luna&#45;Benoso, C. A. Jimenez&#45;Vazquez, and M. D. Gonzalez Ram&iacute;rez, "Cipher image damage and decisions in real time," <i>Journal of Electronic Imaging,</i> vol. 24, no. 1, pp. 013 012&#45;1&#45;13, 2015.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054308&pid=S1870-9044201500020000800016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;17&#93; R. Gonzalez and R. Woods, <i>Digital Image Processing.</i> Prentice Hall, 2008.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054310&pid=S1870-9044201500020000800017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;18&#93; P. Soille, <i>Morphological Image Analysis.</i> Springer&#45;Verlag, 2004.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054312&pid=S1870-9044201500020000800018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;19&#93; R. Wolpe and R. Myers, <i>Probability and Statistics for Engineers and Scientists.</i> Prentice Hall, 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054314&pid=S1870-9044201500020000800019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;20&#93; A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo, <i>A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications.</i> NIST 800&#45;22, 2010.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054316&pid=S1870-9044201500020000800020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;21&#93; J. Peters, D. Janzing, and B. Scholkopf, "Causal inference on discrete data using additive noise models," <i>IEEE Transactions on Pattern Analysis &amp; Machine Intelligence,</i> vol. 33, no. 12, pp. 2436&#45;2450, 2011.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054318&pid=S1870-9044201500020000800021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;22&#93; Y. Yao and S.&#45;S. Chen, "Multiplicative noise enhances spatial reciprocity," <i>Physica A: Statistical Mechanics and its Applications,</i> vol. 413, no. 1, pp. 432&#45;437, 2014.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054320&pid=S1870-9044201500020000800022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;23&#93; "Practicas comerciales &#45; requisitos que deben observarse para la conservaci&oacute;n de mensajes de datos," 2002, Nom&#45;151. Norma Oficial Mexicana NOM&#45;151&#45;SCFI&#45;2002.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054322&pid=S1870-9044201500020000800023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;24&#93; P. Dymora, M. Mazurek, and D. Strzalka, "Long&#45;range dependencies in quick&#45;sort algorithm," <i>Przeglad Elektrotechniczny,</i> vol. 90, no. 1, pp. 149&#45;152, 2014.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054324&pid=S1870-9044201500020000800024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;25&#93; J. Daemen and V. Rijmen, "AES proposal: Rijndael," 1998.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054326&pid=S1870-9044201500020000800025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;26&#93; D. A. Osvik, A. Shamir, and E. Tromer, "Cache attacks and countermeasures: The case of AES," <i>Lecture Notes in Computer Science,</i> vol. 3860, pp. 1&#45;20, 2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054328&pid=S1870-9044201500020000800026&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;27&#93; "Data encryption standard (DES)," 1999, FIPS PUB 46&#45;3.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054330&pid=S1870-9044201500020000800027&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;28&#93; S. Michael, <i>Calculus: c&aacute;lculo infinitesimal.</i> Barcelona, Spain: Reverte, 1993.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054332&pid=S1870-9044201500020000800028&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;29&#93; "Jaohxv. pi world," <a href="http://ja0hxv.calico.jp/pai/estart.html" target="_blank">http://ja0hxv.calico.jp/pai/estart.html</a>, accessed: 2010&#45;09&#45;30.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054334&pid=S1870-9044201500020000800029&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;30&#93; J. Gallian, <i>Contemporary abstract algebra.</i> Brooks/Cole, 2011.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054336&pid=S1870-9044201500020000800030&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;31&#93; E. Shannon, "A mathematical theory of communication," <i>Bell Systems Technical Journal,</i> vol. 27, no. 3, pp. 379&#45;423, 1948.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054338&pid=S1870-9044201500020000800031&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;32&#93; M. Abramowitz and I. Stegun, <i>Handbook of Mathematical Functions.</i> Washington: National Bureau of Standards, 1968.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054340&pid=S1870-9044201500020000800032&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;33&#93; T. M. Apostol, <i>Analisis Matematico.</i> Barcelona: Reverte, 1994.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054342&pid=S1870-9044201500020000800033&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;34&#93; V. M. Silva&#45;Garc&iacute;a, R. Flores&#45;Carapia, C. Renter&iacute;a&#45;Marquez, and B. Luna&#45;Benoso, "Triple&#45;DES&#45;96 cryptographic system," <i>International Journal of Contemporary Mathematical Sciences,</i> vol. 8, no. 19, pp. 925&#45;934, 2013.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054344&pid=S1870-9044201500020000800034&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;35&#93; A. Gomez, <i>Enciclopedia de la Seguridad Informatica.</i> Mexico: Alfaomega, 2007.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054346&pid=S1870-9044201500020000800035&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;36&#93; T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," <i>IEEE Transaction on Information Theory,</i> vol. 31, no. 4, pp. 469&#45;472, 1985.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054348&pid=S1870-9044201500020000800036&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;37&#93; R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," <i>Communications of the ACM,</i> vol. 21, no. 2, pp. 120&#45;126, 1978.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054350&pid=S1870-9044201500020000800037&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;38&#93; R. Azarderakhsh and A. Reyhani&#45;Masoleh, "Parallel and high&#45;speed computations of elliptic curve crytography using hybrid&#45;double multipliers," <i>Transactions on Parallel and Distributed Systems,</i> vol. 26, no. 6, pp. 1668&#45;1677, 2015.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054352&pid=S1870-9044201500020000800038&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;39&#93; D. Jay, <i>Probabilidad y Estad&iacute;stica: para ingenier&iacute;a y ciencias.</i> International Thompson, 2005.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054354&pid=S1870-9044201500020000800039&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;40&#93; J. D. Arg&uuml;elles, <i>Antolog&iacute;a general de la poes&iacute;a mexicana.</i> Mexico: Oc&eacute;ano, 2012.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054356&pid=S1870-9044201500020000800040&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baruah]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bonifaci]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[D'Angelo]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Marchetti-Spaccamela]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Megow]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Stougie]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Scheduling real-time mixed-criticality jobs]]></article-title>
<source><![CDATA[IEEE Transactions on Computers]]></source>
<year>2012</year>
<volume>61</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1140-1152</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xuemei]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Tong]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Dai]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A novel scheme reality preserving image encryption]]></article-title>
<source><![CDATA[2011 Third International Conference Measuring Technology and Mechatronics Automation]]></source>
<year>2011</year>
<page-range>218-221</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Study on chaotic cryptosystem for digital image encryption]]></article-title>
<source><![CDATA[2011 Third International Conference Measuring Technology and Mechatronics Automation]]></source>
<year>2011</year>
<page-range>426-430</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zou]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Meng]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhan]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A chaos-based digital image encryption scheme with an improved diffusion strategy]]></article-title>
<source><![CDATA[Optics Express]]></source>
<year>2012</year>
<volume>20</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>2363-78</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A novel image encryption-compression scheme using hyper-chaos and chinese remainder theorem]]></article-title>
<source><![CDATA[Signal Processing: Image Communication]]></source>
<year>2013</year>
<volume>28</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>670-680</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<collab>Advanced encryption standard</collab>
<source><![CDATA[]]></source>
<year>2001</year>
<page-range>197</page-range><publisher-name><![CDATA[FIPS PUB]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stinson]]></surname>
<given-names><![CDATA[D. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptography: Theory and Practice]]></source>
<year>2005</year>
<publisher-name><![CDATA[Chapman & HallCRC Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matsui]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Linear cryptanalysis method for DES cipher]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>1994</year>
<volume>765</volume>
<page-range>386-397</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biham]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Differential cryptanalysis of the full 16-round DES]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>1993</year>
<volume>740</volume>
<page-range>487-496</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Keshari]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Modani]]></surname>
<given-names><![CDATA[S. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Color image encryption scheme based on 4-weighted fractional fourier transform]]></article-title>
<source><![CDATA[Journal of Electronic Imaging]]></source>
<year>2012</year>
<volume>21</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>033 018-1-6</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Sheppard]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Optical color-image encryption and synthesis using coherent diffractive imaging in the fresnel domain]]></article-title>
<source><![CDATA[Optics Express]]></source>
<year>2012</year>
<volume>20</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>3853-65</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Refregier]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Javidi]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Optical image encryption based on input plane and fourier plane random encoding]]></article-title>
<source><![CDATA[Optical Letters]]></source>
<year>1995</year>
<volume>20</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>767-769</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Double random phase encoding using phase reservation and compression]]></article-title>
<source><![CDATA[Journal of Optics]]></source>
<year>2014</year>
<volume>16</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>025 402-7</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Javidi]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Advances in optical security system]]></article-title>
<source><![CDATA[Advances in Optics and Photonics]]></source>
<year>2014</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>120-155</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Jin]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Noonan]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Image encryption using the two-dimensional logistic chaotic map]]></article-title>
<source><![CDATA[Journal of Electronic Imaging]]></source>
<year>2012</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>013014</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silva-García]]></surname>
<given-names><![CDATA[V. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Flores-Carapia]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rentería-Marquez]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Luna-Benoso]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Jimenez-Vazquez]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gonzalez Ramírez]]></surname>
<given-names><![CDATA[M. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cipher image damage and decisions in real time]]></article-title>
<source><![CDATA[Journal of Electronic Imaging]]></source>
<year>2015</year>
<volume>24</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>013 012-1-13</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gonzalez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Woods]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Image Processing]]></source>
<year>2008</year>
<publisher-name><![CDATA[Prentice Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Soille]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Morphological Image Analysis]]></source>
<year>2004</year>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolpe]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Myers]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Probability and Statistics for Engineers and Scientists]]></source>
<year>2007</year>
<publisher-name><![CDATA[Prentice Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rukhin]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Soto]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Nechvatal]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Smid]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Barker]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Leigh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Levenson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vangel]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Banks]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Heckert]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Dray]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Vo]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications]]></source>
<year>2010</year>
<publisher-name><![CDATA[NIST 800-22]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peters]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Janzing]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Scholkopf]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Causal inference on discrete data using additive noise models]]></article-title>
<source><![CDATA[IEEE Transactions on Pattern Analysis & Machine Intelligence]]></source>
<year>2011</year>
<volume>33</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>2436-2450</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[S.-S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Multiplicative noise enhances spatial reciprocity]]></article-title>
<source><![CDATA[Physica A: Statistical Mechanics and its Applications]]></source>
<year>2014</year>
<volume>413</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>432-437</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="book">
<source><![CDATA[Practicas comerciales - requisitos que deben observarse para la conservación de mensajes de datos]]></source>
<year>2002</year>
<publisher-name><![CDATA[Nom-151. Norma Oficial Mexicana NOM-151-SCFI-2002]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dymora]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Mazurek]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Strzalka]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Long-range dependencies in quick-sort algorithm]]></article-title>
<source><![CDATA[Przeglad Elektrotechniczny]]></source>
<year>2014</year>
<volume>90</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>149-152</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Daemen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rijmen]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[AES proposal: Rijndael]]></source>
<year>1998</year>
</nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Osvik]]></surname>
<given-names><![CDATA[D. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tromer]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cache attacks and countermeasures: The case of AES]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2006</year>
<volume>3860</volume>
<page-range>1-20</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="book">
<collab>Data encryption standard</collab>
<source><![CDATA[]]></source>
<year>1999</year>
<page-range>46-3</page-range><publisher-name><![CDATA[FIPS PUB]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Michael]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Calculus: cálculo infinitesimal]]></source>
<year>1993</year>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
<publisher-name><![CDATA[Reverte]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="">
<source><![CDATA[Jaohxv. pi world]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gallian]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Contemporary abstract algebra]]></source>
<year>2011</year>
<publisher-name><![CDATA[BrooksCole]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shannon]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A mathematical theory of communication]]></article-title>
<source><![CDATA[Bell Systems Technical Journal]]></source>
<year>1948</year>
<volume>27</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>379-423</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abramowitz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Stegun]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of Mathematical Functions]]></source>
<year>1968</year>
<publisher-loc><![CDATA[Washington ]]></publisher-loc>
<publisher-name><![CDATA[National Bureau of Standards]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Apostol]]></surname>
<given-names><![CDATA[T. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analisis Matematico]]></source>
<year>1994</year>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
<publisher-name><![CDATA[Reverte]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silva-García]]></surname>
<given-names><![CDATA[V. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Flores-Carapia]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rentería-Marquez]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Luna-Benoso]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Triple-DES-96 cryptographic system]]></article-title>
<source><![CDATA[International Journal of Contemporary Mathematical Sciences]]></source>
<year>2013</year>
<volume>8</volume>
<numero>19</numero>
<issue>19</issue>
<page-range>925-934</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gomez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Enciclopedia de la Seguridad Informatica]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Mexico ]]></publisher-loc>
<publisher-name><![CDATA[Alfaomega]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[ElGamal]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A public key cryptosystem and a signature scheme based on discrete logarithms]]></article-title>
<source><![CDATA[IEEE Transaction on Information Theory]]></source>
<year>1985</year>
<volume>31</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>469-472</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivest]]></surname>
<given-names><![CDATA[R. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Adleman]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A method for obtaining digital signatures and public key cryptosystems]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>1978</year>
<volume>21</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>120-126</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Azarderakhsh]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Reyhani-Masoleh]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Parallel and high-speed computations of elliptic curve crytography using hybrid-double multipliers]]></article-title>
<source><![CDATA[Transactions on Parallel and Distributed Systems]]></source>
<year>2015</year>
<volume>26</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1668-1677</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jay]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Probabilidad y Estadística: para ingeniería y ciencias]]></source>
<year>2005</year>
<publisher-name><![CDATA[International Thompson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Argüelles]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Antología general de la poesía mexicana]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Mexico ]]></publisher-loc>
<publisher-name><![CDATA[Océano]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
