Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home

Z Rahman, X Yi, M Billah, M Sumi, A Anwar - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) has brought new ways for humans and machines to
communicate with each other over the internet. Though sensor-driven devices have largely …

[图书][B] Spectral logic and its applications for the design of digital devices

MG Karpovsky, RS Stankovic, JT Astola - 2008 - books.google.com
Spectral techniques facilitate the design and testing of today's increasingly complex digital
devices There is heightened interest in spectral techniques for the design of digital devices …

A novel strong S-box design using quantum crossover and chaotic boolean functions for symmetric cryptosystems

H Alsaif, R Guesmi, A Kalghoum, BM Alshammari… - Symmetry, 2023 - mdpi.com
In this paper, we propose a new method for drawing a cryptographically strong substitution
box using the Lorenz system and quantum genetic algorithm techniques. We used the …

[PDF][PDF] Pure dynamic S-box construction

S Katiyar, N Jeyanthi - International Journal of Computers, 2016 - iaras.org
The S-box or substitution table used to provide non-linearity to encrypting algorithm. There
are two types of S-box design such as Static S-box and Dynamic S-box. This paper reviews …

A generalized reverse jacket transform

MH Lee, BS Rajan, JY Park - … on Circuits and Systems II: Analog …, 2001 - ieeexplore.ieee.org
Generalization of the well-known Walsh-Hadamard transform (WHT), namely center-
weighted Hadamard transform (CWHT) and complex reverse-jacket transform (CRJT) have …

Методика выбора ключевой информации для алгоритма блочного шифрования

ОН Жданов - 2016 - elibrary.ru
Как известно, при использовании незащищенного канала актуальными являются
задачи обеспечения конфиденциальности передаваемых данных и аутентификации …

Chaos Meets Cryptography: Developing an S-Box Design with the Rössler Attractor

E Corona-Bermúdez, JC Chimal-Eguía… - Mathematics, 2023 - mdpi.com
The volume of data transmitted over networks has significantly increased in recent years. For
that reason, safeguarding the privacy, authenticity, and confidentiality of specific data is …

[图书][B] Linear cryptanalysis of substitution-permutation networks

LT Keliher - 2003 - madchat.fr
The subject of this thesis is linear cryptanalysis of substitution-permutation networks (SPNs).
We focus on the rigorous form of linear cryptanalysis, which requires the concept of linear …

SAT_Jo: An enhanced lightweight block cipher for the internet of things

MJR Shantha, L Arockiam - 2018 Second International …, 2018 - ieeexplore.ieee.org
The utilization of resource constrained computing devices such as Radio-Frequency
IDentification (RFID) tags, sensor nodes, industrial controllers and smart cards is very …

Evolutionary computation based cryptanalysis: A first study

EC Laskari, GC Meletiou, YC Stamatiou… - … : Theory, Methods & …, 2005 - Elsevier
In this contribution we apply the particle swarm optimization method, which originates from
the field of evolutionary computation, to address an interesting problem introduced by the …