The main component of a cryptographic system that allows us to ensure its strength against attacks, is the substitution box. The strength of this component can be validated by various …
This paper aims to apply two variants of the hybrid optimization algorithm, namely Chaotic Honey Badger Algorithm (CHBA) and Group Teaching Optimization Algorithm (GTOA) to …