Secure data encryption based on quantum walks for 5G Internet of Things scenario

AA Abd El-Latif, B Abd-El-Atty… - … on Network and …, 2020 - ieeexplore.ieee.org
Fifth generation (5G) networks are the base communication technology for connecting
objects in the Internet of Things (IoT) environment. 5G is being developed to provide …

[HTML][HTML] Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications

AA Abd El-Latif, B Abd-El-Atty, M Amin, AM Iliyasu - Scientific reports, 2020 - nature.com
Designing efficient and secure cryptosystems has been a preoccupation for many scientists
and engineers for a long time wherein they use chaotic systems to design new …

Design of highly nonlinear substitution boxes based on I-Ching operators

T Zhang, CLP Chen, L Chen, X Xu… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
This paper is to design substitution boxes (S-Boxes) using innovative I-Ching operators
(ICOs) that have evolved from ancient Chinese I-Ching philosophy. These three operators …

A novel modular approach based substitution-box design for image encryption

AH Zahid, E Al-Solami, M Ahmad - IEEE Access, 2020 - ieeexplore.ieee.org
In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data
nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed …

A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm

HS Alhadawi, MA Majid, D Lambić… - Multimedia Tools and …, 2021 - Springer
Abstract Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to
achieve the property of confusion in modern symmetric ciphers and offer resistance to …

Efficient image encryption scheme using Henon map, dynamic S-boxes and elliptic curve cryptography

S Ibrahim, A Alharbi - IEEE Access, 2020 - ieeexplore.ieee.org
Image encryption schemes can be vulnerable to a variety of cryptanalysis attacks. The use of
key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen …

An efficient image encryption scheme based on S-boxes and fractional-order differential logistic map

YQ Zhang, JL Hao, XY Wang - Ieee Access, 2020 - ieeexplore.ieee.org
In this work, an efficient image encryption based on S-boxes and fractional-order logistic
map is proposed. The features of the fractional-order chaotic system in dynamical behaviors …

A novel method for designing S-box based on chaotic map and teaching–learning-based optimization

T Farah, R Rhouma, S Belghith - Nonlinear dynamics, 2017 - Springer
A new method for obtaining strong S-boxes based on chaotic map and Teaching–Learning-
Based Optimization (TLBO) is presented in this paper. Our method presents eight rounds; …

A genetic algorithm for constructing bijective substitution boxes with high nonlinearity

Y Wang, Z Zhang, LY Zhang, J Feng, J Gao, P Lei - Information Sciences, 2020 - Elsevier
Substitution box (S-box) is one of the most important components in the design of block
ciphers. In this work, different from traditional methods, we convert the construction of n× n S …

A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map

HA Ahmed, MF Zolkipli, M Ahmad - Neural Computing and Applications, 2019 - Springer
Substitution boxes are essential nonlinear components responsible to impart strong
confusion and security in most of modern symmetric ciphers. Constructing efficient S-boxes …