A Novel S-Box Generation Method Based on Metastable Inducing over FPGA for Block Ciphers

AM GARİPCAN, Y AYDIN, F ÖZKAYNAK - Knowledge-Based Systems, 2025 - Elsevier
Substitution boxes (s-boxes) providing the nonlinearity property are fundamental
components of modern encryption systems. The security of these systems directly depends …

A combinatory approach of non-chain ring and henon map for image encryption application

S Mohi, U Din, T Shah, F Alblehai, S Nooh… - Scientific Reports, 2025 - nature.com
Algebraic structures play a vital role in securing important data. These structures are utilized
to construct the non-linear components of block ciphers. Since constructing non-linear …

S-box design based on logistic skewed chaotic map and modified Rabin-Karp algorithm: applications to multimedia security

A Waheed, F Subhan - Physica Scripta, 2024 - iopscience.iop.org
A substitution box (S-box) serves as the nonlinearity component in a symmetric key
encryption scheme; it directly determines the performance and security level of ciphers …

Enhancing Image Data Security with Chain and Non-Chain Galois Ring Structures

MU Safdar, T Shah, A Ali - Mathematics and Computers in Simulation, 2024 - Elsevier
The local ring-based cryptosystem is built upon the core mathematical operations of the
algebraic structure of local rings, which provides a significant advantage in ensuring security …

Sequence Control Mechanism for the Handover of Distribution Networks under Disaster Recovery

C Long, J Zhang, H Zhang, X Liu, Y Gao, X Su… - IEEE Access, 2025 - ieeexplore.ieee.org
In the distribution network under the background of disaster, the distribution terminal
embodies the characteristics of disorder. Therefore, when the distribution terminal node …

A Novel S-Box Generation Method Based on Metastable Inducing Over Fpga for Block

AM GARİPCAN, Y AYDIN, F ÖZKAYNAK - Available at SSRN 4758295 - papers.ssrn.com
The security of encryption systems directly depends on the quality of the s-boxes, providing
a high level of resistance to sophisticated attack methods. Although there is no perfect …