TS Ali, R Ali - Multimedia Tools and Applications, 2020 - Springer
A new color image encryption algorithm is proposed by using chaotic maps. Cipher image is constructed in three phases. In the first phase permutation of digital image is performed with …
Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …
F Özkaynak - Physica A: Statistical Mechanics and its Applications, 2020 - Elsevier
Many cryptographic protocol have been realized using similarities between chaos and cryptology. One of the most successful examples of these protocols has been s-box …
Achieving proper nonlinear properties and autocorrelation in the S-box structure is an open challenge in cryptography. Besides, there have been numerous articles on the optimization …
C Pilato, AB Chowdhury, D Sciuto… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Semiconductor design companies are integrating proprietary intellectual property (IP) blocks to build custom integrated circuits (ICs) and fabricate them in a third-party foundry …
V Panchami, MM Mathews - Journal of King Saud University-Computer and …, 2023 - Elsevier
Abstract The Internet of Things is a resource-constrained device that demands lightweight cryptographic solutions to achieve high performance and optimal security. In lightweight …
VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
MSM Malik, MA Ali, MA Khan… - IEEE …, 2020 - ieeexplore.ieee.org
This work reports a novel chaos-based affine transformation generation method, which is based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …
B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang… - Annual Cryptology …, 2015 - Springer
As two important cryptanalytic methods, impossible differential and integral cryptanalysis have attracted much attention in recent years. Although relations among other cryptanalytic …