Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Image encryption using a 3D modular hybrid chaotic system and CRC key generator
With the development of social networks, the demand for information security is increasing day by day, and as images are one of the most commonly used formats, this paper introduces a novel method for encrypti...
-
Article
Open AccessOn 2-absorbing commutative semigroups and their applications to rings
A commutative ring R is called 2-absorbing (Badawi in Bull. Aust. Math. Soc. 75:417–429, 2007) if for arbitrary elements a,b,c∈R, abc=0 if and only if ab=0 or bc=0 or ac=0. In this paper we study this concept in ...