An image encryption scheme based on a new hybrid chaotic map and optimized substitution box

MAB Farah, A Farah, T Farah - Nonlinear Dynamics, 2020 - Springer
This paper proposes a new hybrid chaotic map and a different way of using optimization
technique to improve the performance of encryption algorithms. Compared to other chaotic …

An efficient image encryption scheme based on the LSS chaotic map and single S-box

Q Lu, C Zhu, X Deng - Ieee Access, 2020 - ieeexplore.ieee.org
This paper presents an efficient and secure chaotic S-Box based image encryption
algorithm. Firstly, by cryptanalyzing a multiple chaotic S-Boxes based image encryption …

Novel image cryptosystem based on new 2D hyperchaotic map and dynamical chaotic S-box

S Zhou, Y Qiu, X Wang, Y Zhang - Nonlinear Dynamics, 2023 - Springer
Chaotic systems are widely used in image encryption due to their sensitivity to initial values,
ergodicity, and other properties; many image encryption algorithms based on chaotic …

[图书][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

Design of highly nonlinear substitution boxes based on I-Ching operators

T Zhang, CLP Chen, L Chen, X Xu… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
This paper is to design substitution boxes (S-Boxes) using innovative I-Ching operators
(ICOs) that have evolved from ancient Chinese I-Ching philosophy. These three operators …

A novel modular approach based substitution-box design for image encryption

AH Zahid, E Al-Solami, M Ahmad - IEEE Access, 2020 - ieeexplore.ieee.org
In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data
nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed …

[图书][B] Cryptographic Boolean functions and applications

TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …

An image encryption algorithm using a dynamic S-box and chaotic maps

J Zheng, Q Zeng - Applied Intelligence, 2022 - Springer
This paper presents an image encryption algorithm based on dynamic S-box. Encryption
algorithm includes four stages: generation of encryption keys, the construction of the S-box …

[PDF][PDF] Cipher and hash function design strategies based on linear and differential cryptanalysis

J Daemen - 1995 - cs.ru.nl
This thesis contains a new approach to design block ciphers, synchronous and self-
synchronizing stream ciphers and cryptographic hash functions. The goal of this approach is …

[图书][B] Bent functions: results and applications to cryptography

N Tokareva - 2015 - books.google.com
Bent Functions: Results and Applications to Cryptography offers a unique survey of the
objects of discrete mathematics known as Boolean bent functions. As these maximal …