Substitution box generator with enhanced cryptographic properties and minimal computation time

T Haider, NA Azam, U Hayat - Expert Systems with Applications, 2024 - Elsevier
With the widespread use of digital devices and the internet, implementing advanced security
systems is essential to protect confidential information from cyberattacks and unauthorized …

[HTML][HTML] Efficient and secure image encryption using key substitution process with discrete wavelet transform

MU Rehman, A Shafique, KH Khan… - Journal of King Saud …, 2023 - Elsevier
Over the past few years, there has been a rise in the utilization of chaotic encryption
algorithms for securing images. The majority of chaos-based encryption algorithms adhere …

Automated chaos-driven S-box generation and analysis tool for enhanced cryptographic resilience

Y Aydın, F Özkaynak - IEEE Access, 2023 - ieeexplore.ieee.org
In a rapidly advancing world of technology, information security studies have become the
backbone of the digital age, and steps in this area are critical. In this context, cryptography …

[HTML][HTML] Chaos and cellular automata-based substitution box and its application in cryptography

A Shafique, KH Khan, MM Hazzazi, I Bahkali, Z Bassfar… - Mathematics, 2023 - mdpi.com
Substitution boxes are the key factor in symmetric-key cryptosystems that determines their
ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have …

Fuzzy logic-based substitution-box for robust medical image encryption in telemedicine

A Razaq, LA Maghrabi, M Ahmad, F Aslam… - IEEE Access, 2024 - ieeexplore.ieee.org
Due to privacy and sensitivity of the medical images, the creation of strong medical image
encryption schemes has gained the attention of cryptographers. In this study, a robust …

[HTML][HTML] ESTPE: An efficient and stable thumbnail-preserving encryption scheme

D Xie, Y Zhang, Z Hu, F Chen, T Wang - Journal of King Saud University …, 2023 - Elsevier
Thumbnail-preserving encryption (TPE) can balance the usability and the privacy of images
in the cloud. Most ideal TPE schemes obtain thumbnails by dividing the plaintext image into …

[HTML][HTML] An efficient and secure cryptographic algorithm using elliptic curves and max-plus algebra-based wavelet transform

KA Sattar, T Haider, U Hayat, MD Bustamante - Applied Sciences, 2023 - mdpi.com
With the advent of communication networks, protecting data from security threats has
become increasingly important. To address this issue, we present a new text encryption …

A novel approach for designing secure substitution boxes based on Catalan number and elliptic curve

B Arshad, M Ehatisham-ul-Haq, Z Hussain… - Multimedia Tools and …, 2024 - Springer
While using the internet, sending confidential emails, or dealing with financial information
that affects many aspects of our everyday life, security is one of the most important …

Image encryption algorithm based on a new 2D polynomial chaotic map and dynamic S-box

WQ Wu, LS Kong - Signal, Image and Video Processing, 2024 - Springer
Due to its amplification effect on the deviation of the initial value, chaotic systems have been
closely integrated with image encryption in the past few years, which inspires the research of …

A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms

Y Aydin, AM Garipcan, F Özkaynak - Arabian Journal for Science and …, 2024 - Springer
In this study, a novel robust design methodology that successfully meets the performance
and security criteria for substitution-boxes (s-boxes), critical component in block cipher …