[HTML][HTML] A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box

TS Ali, R Ali - Multimedia Tools and Applications, 2022 - Springer
In modern technological era image encryption has become an attractive and interesting field
for researchers. They work for improving the security of image data from unauthorized …

A new chaos based color image encryption algorithm using permutation substitution and Boolean operation

TS Ali, R Ali - Multimedia Tools and Applications, 2020 - Springer
A new color image encryption algorithm is proposed by using chaotic maps. Cipher image is
constructed in three phases. In the first phase permutation of digital image is performed with …

[HTML][HTML] A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field

N Siddiqui, F Yousaf, F Murtaza, M Ehatisham-ul-Haq… - Plos one, 2020 - journals.plos.org
Cryptography is commonly used to secure communication and data transmission over
insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …

On the effect of chaotic system in performance characteristics of chaos based s-box designs

F Özkaynak - Physica A: Statistical Mechanics and its Applications, 2020 - Elsevier
Many cryptographic protocol have been realized using similarities between chaos and
cryptology. One of the most successful examples of these protocols has been s-box …

Execution examination of chaotic S-box dependent on improved PSO algorithm

N Hematpour, S Ahadpour - Neural Computing and Applications, 2021 - Springer
Achieving proper nonlinear properties and autocorrelation in the S-box structure is an open
challenge in cryptography. Besides, there have been numerous articles on the optimization …

ASSURE: RTL locking against an untrusted foundry

C Pilato, AB Chowdhury, D Sciuto… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Semiconductor design companies are integrating proprietary intellectual property (IP) blocks
to build custom integrated circuits (ICs) and fabricate them in a third-party foundry …

[HTML][HTML] A substitution box for lightweight ciphers to secure internet of things

V Panchami, MM Mathews - Journal of King Saud University-Computer and …, 2023 - Elsevier
Abstract The Internet of Things is a resource-constrained device that demands lightweight
cryptographic solutions to achieve high performance and optimal security. In lightweight …

[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms

VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …

Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices

MSM Malik, MA Ali, MA Khan… - IEEE …, 2020 - ieeexplore.ieee.org
This work reports a novel chaos-based affine transformation generation method, which is
based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …

Links among impossible differential, integral and zero correlation linear cryptanalysis

B Sun, Z Liu, V Rijmen, R Li, L Cheng, Q Wang… - Annual Cryptology …, 2015 - Springer
As two important cryptanalytic methods, impossible differential and integral cryptanalysis
have attracted much attention in recent years. Although relations among other cryptanalytic …