Q Lu, C Zhu, X Deng - Ieee Access, 2020 - ieeexplore.ieee.org
This paper presents an efficient and secure chaotic S-Box based image encryption algorithm. Firstly, by cryptanalyzing a multiple chaotic S-Boxes based image encryption …
S Zhou, Y Qiu, X Wang, Y Zhang - Nonlinear Dynamics, 2023 - Springer
Chaotic systems are widely used in image encryption due to their sensitivity to initial values, ergodicity, and other properties; many image encryption algorithms based on chaotic …
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
T Zhang, CLP Chen, L Chen, X Xu… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
This paper is to design substitution boxes (S-Boxes) using innovative I-Ching operators (ICOs) that have evolved from ancient Chinese I-Ching philosophy. These three operators …
AH Zahid, E Al-Solami, M Ahmad - IEEE Access, 2020 - ieeexplore.ieee.org
In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed …
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. While …
This paper presents an image encryption algorithm based on dynamic S-box. Encryption algorithm includes four stages: generation of encryption keys, the construction of the S-box …
This thesis contains a new approach to design block ciphers, synchronous and self- synchronizing stream ciphers and cryptographic hash functions. The goal of this approach is …
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal …