This article addresses the telecommunications industry's priority of ensuring information security during the transition to next-generation networks. It proposes an image encryption …
Y Aydin, AM Garipcan, F Özkaynak - Arabian Journal for Science and …, 2024 - Springer
In this study, a novel robust design methodology that successfully meets the performance and security criteria for substitution-boxes (s-boxes), critical component in block cipher …
A Malal, C Tezcan - Microprocessors and Microsystems, 2024 - Elsevier
One of the main layers in the Advanced Encryption Standard (AES) is the substitution layer, where an 8× 8 S-Box is used 16 times. The substitution layer provides confusion and makes …
J Ryu, Y Kim, S Yoon, JS Kang, Y Yeom - IEEE Access, 2024 - ieeexplore.ieee.org
Post-quantum cryptography (PQC) has been actively explored to meet the requirements arising with the rapid development of quantum computers. The National Institute of …
Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare Page 1 AIMS Mathematics, 9(3): 6207–6237. DOI: 10.3934/math.2024303 …
AA Qarni, K Ishaq, NA Nawaz, G Mustafa, M Fahad - researchgate.net
In today's world, most information exists in digital form, and even the remaining hard copies are transitioning too digital. This shift has brought numerous advantages, allowing people to …