T Haider, NA Azam, U Hayat - Expert Systems with Applications, 2024 - Elsevier
With the widespread use of digital devices and the internet, implementing advanced security systems is essential to protect confidential information from cyberattacks and unauthorized …
R Ali, MK Jamil, AS Alali, J Ali, G Afzal - IEEE Access, 2023 - ieeexplore.ieee.org
Modern cryptographic systems use substitution boxes (S-boxes) throughout the encryption process to enhance the security of the plaintext. The integrity of the communication process …
M Long, L Wang - IEEE Access, 2021 - ieeexplore.ieee.org
To further enhance the nonlinear and cryptographic properties of chaotic S-boxes, a novel S- box design is proposed based on the discrete chaotic map and improved artificial bee …
NA Khan, M Altaf, FA Khan - Multimedia Tools and Applications, 2021 - Springer
Increased demand of multimedia data over heterogeneous networks has led to the requirement for increased compression and suitable security. Both of these demands …
Block cipher has been a standout amongst the most reliable option by which data security is accomplished. Block cipher strength against various attacks relies on substitution boxes. In …
The resistance of S-box-based cryptosystems to linear cryptanalysis is often determined by the nonlinearity (NL) and the linear approximation probability (LAP) of the underlying S-box …
In this paper, we propose a new method for drawing a cryptographically strong substitution box using the Lorenz system and quantum genetic algorithm techniques. We used the …
Symmetric encryption approaches are generally used for data encryption. One of the basic requirements for symmetric encryption algorithms to provide security is strong s-box …
D Zhu, X Tong, M Zhang, Z Wang - Symmetry, 2020 - mdpi.com
The construction of substitute box (S-box) has always been an important research direction in cryptography. This paper proposes a new S-box generation method and advanced design …