A novel construction of efficient substitution-boxes using cubic fractional transformation

AH Zahid, MJ Arshad, M Ahmad - Entropy, 2019 - mdpi.com
A symmetric block cipher employing a substitution–permutation duo is an effective technique
for the provision of information security. For substitution, modern block ciphers use one or …

A novel construction of dynamic S-box with high nonlinearity using heuristic evolution

AH Zahid, AM Iliyasu, M Ahmad, MMU Shaban… - IEEE …, 2021 - ieeexplore.ieee.org
For decades, the security and privacy of data are among the major challenges faced by
service providers dealing with public data. To cope with these challenges, most of the …

A new S-box generator algorithm based on 3D chaotic maps and whale optimization algorithm

F Artuğer - Wireless Personal Communications, 2023 - Springer
Encryption provides security in cases such as storing confidential information or transmitting
it over a network. Today, block cipher algorithms are generally used for encryption …

Selective encryption of JPEG images with chaotic based novel S-box

NA Khan, M Altaf, FA Khan - Multimedia Tools and Applications, 2021 - Springer
Increased demand of multimedia data over heterogeneous networks has led to the
requirement for increased compression and suitable security. Both of these demands …

Dynamic S-box design using a novel square polynomial transformation and permutation

AH Zahid, H Rashid, MMU Shaban, S Ahmad… - IEEE …, 2021 - ieeexplore.ieee.org
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of
security for the plaintext in the encryption phase and transforming the ciphertext on the …

Construction of optimized dynamic S-boxes based on a cubic modular transform and the sine function

AH Zahid, M Ahmad, A Alkhayyat, MJ Arshad… - IEEE …, 2021 - ieeexplore.ieee.org
The protection of sensitive data from illegitimate users is one of the main challenges in
today's technological era. To handle prevailing security-related problems and challenges …

Computationally efficient selective video encryption with chaos based block cipher

M Altaf, A Ahmad, FA Khan, Z Uddin, X Yang - Multimedia Tools and …, 2018 - Springer
Selective encryption techniques are usually used with resource limited communication
infrastructure and devices like wireless networks and mobile devices, to reduce …

A study of text-theoretical approach to S-box construction with image encryption applications

A Mahboob, M Nadeem, MW Rasheed - Scientific Reports, 2023 - nature.com
Data protection is regarded as one of the biggest issues facing companies that have been
using public data for a long time. Numerous encryption techniques have been used to …

A novel of substitution-box design using PLL algorithms in magic cube

RM Zaki, HBA Wahab - Periodicals of Engineering and Natural …, 2021 - pen.ius.edu.ba
In most modern symmetric ciphers, substitution boxes are non-linear core components that
provide robust security and confusion. The construction of active S-boxes has been hot …

Study on S-box properties of convolution coder

S RoyChatterjee, K Sur, M Chakraborty - Proceedings of International …, 2020 - Springer
The substitution box (S-box) is an essential component in cryptography. The desirable
cryptographic properties of the S-box are bijective, non-linearity, strict avalanche, bit …