Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization

KZ Zamli, A Kader, F Din, HS Alhadawi - Neural Computing and …, 2021 - Springer
Cryptography often involves substituting (and converting) the secret information into dummy
data so that it could reach the desired destination without leakage. Within symmetric key …

New results about the boomerang uniformity of permutation polynomials

K Li, L Qu, B Sun, C Li - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of
S-boxes: boomerang connectivity table (BCT for short) for evaluating the subtleties of …

Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization

KZ Zamli, F Din, HS Alhadawi - Neural Computing and Applications, 2023 - Springer
This paper introduces a new variant of the metaheuristic algorithm based on the naked mole
rat (NMR) algorithm, called the Q-learning naked mole rat algorithm (QL-NMR), for …

Optimizing S-box generation based on the adaptive agent heroes and cowards algorithm

KZ Zamli - Expert Systems with Applications, 2021 - Elsevier
This paper introduces a new variant of a metaheuristic algorithm based on Agent Heroes
and Cowards Algorithm (AHC), called Adaptive Agent Heroes and Cowards Algorithm …

Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties

G Ivanov, N Nikolov, S Nikova - Cryptography and Communications, 2016 - Springer
Often the S-boxes are the only nonlinear components in a block cipher and as such play an
important role in ensuring its resistance to cryptanalysis. Cryptographic properties and …

Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization

KZ Zamli, HS Alhadawi, F Din - Neural Computing and Applications, 2023 - Springer
This paper introduces a new variant of a recent metaheuristic algorithm based on the Social
Network Search algorithm (SNS), which is called the Roulette Wheel Social Network Search …

Cryptographically strong S-boxes generated by modified immune algorithm

G Ivanov, N Nikolov, S Nikova - … and Information Security in the Balkans …, 2016 - Springer
S-boxes play an important role in ensuring the resistance of block ciphers against
cryptanalysis as often they are their only nonlinear components. The cryptographic …

A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size

A Canteaut, S Duval, L Perrin - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The existence of almost perfect nonlinear (APN) permutations operating on an even number
of variables was a long-standing open problem, until an example with six variables was …

On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity

KH Kim, S Mesnager, JH Choe, DN Lee, S Lee… - Designs, Codes and …, 2022 - Springer
Motivated by recent works on the butterfly structure, particularly by its generalization
introduced by Canteaut et al.(IEEE Trans Inf Theory 63 (11): 7575–7591, 2017), we first …

Evolving bijective S-Boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties

PK Behera, S Gangopadhyay - Journal of Ambient Intelligence and …, 2023 - Springer
The security of the block cipher largely depends upon the cryptographic strength of the S-
Boxes resistance to the existing cryptanalytic attacks. The nonlinearity and differential …