Skip to main content

and
  1. No Access

    Article

    Image encryption using a 3D modular hybrid chaotic system and CRC key generator

    With the development of social networks, the demand for information security is increasing day by day, and as images are one of the most commonly used formats, this paper introduces a novel method for encrypti...

    A. Yousefian Darani, Y. Khedmati Yengejeh, R. Hosseinzadeh in Journal of Optics (2024)

  2. Article

    Open Access

    On 2-absorbing commutative semigroups and their applications to rings

    A commutative ring R is called 2-absorbing (Badawi in Bull. Aust. Math. Soc. 75:417–429, 2007) if for arbitrary elements a,b,cR, abc=0 if and only if ab=0 or bc=0 or ac=0. In this paper we study this concept in ...

    A. Yousefian Darani, E. R. Puczyłowski in Semigroup Forum (2013)