Literature survey on nonlinear components and chaotic nonlinear components of block ciphers

I Hussain, T Shah - Nonlinear Dynamics, 2013 - Springer
In the modern era of secure communication, it is important to create uncertainty in the
original data in order to avoid unauthorized entities to extract or manipulate information …

LoRCA: Lightweight round block and stream cipher algorithms for IoV systems

HN Noura, O Salman, R Couturier, A Chehab - Vehicular Communications, 2022 - Elsevier
Abstract The Internet of Vehicles (IoV) is a disruptive technology that has a great impact on
people's lifestyle and activities. Fully autonomous vehicles are the next generation of …

A polymorphic advanced encryption standard–a novel approach

A Altigani, S Hasan, B Barry, S Naserelden… - IEEE …, 2021 - ieeexplore.ieee.org
To secure various forms of data, a polymorphic variant of the Advanced Encryption Standard
(P-AES) has been introduced. In the P-AES, the AES parameters' values will change with …

Constructing key dependent dynamic S-Box for AES block cipher system

G Manjula, HS Mohan - 2016 2nd international conference on …, 2016 - ieeexplore.ieee.org
As the rapid evolution of digital data transaction in E-way is expanding, information safety is
emerging with much more importance in data storage and broadcast. Cryptography has …

A proposal for improving AES S-box with rotation and key-dependent

J Juremi, R Mahmod, S Sulaiman - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
In this paper, a new AES-like design for key-dependent AES using S-box rotation is
proposed. We also show how this property can be used to make the S-box key-dependent …

Enhanced AES cryptosystem by using genetic algorithm and neural network in S-box

K Kalaiselvi, A Kumar - 2016 IEEE International Conference on …, 2016 - ieeexplore.ieee.org
Cryptography based on block ciphers use Key-dependent ciphers for encryption and
decryption. The efficiency of these systems depends on the security and the speed of the …

[PDF][PDF] Enhancing advanced encryption standard S-box generation based on round key

JJRMS Sulaiman, J Ramli - International Journal of Cyber-Security and …, 2012 - Citeseer
This paper presents a new AES-like design for keydependent AES using S-box rotation. The
algorithm involves key expansion algorithm together with S-box rotation and this property …

Simultaneous encryption and authentication of messages over GPUs

A Fanfakh, H Noura, R Couturier - Multimedia Tools and Applications, 2024 - Springer
There has recently been a rising interest in inventing new efficient cryptographic algorithms,
thanks to advances in the field of Graphics Processing Unit (GPU) technology. Current …

Overview of efficient symmetric cryptography: dynamic vs static approaches

HN Noura, A Chehab… - 2020 8th International …, 2020 - ieeexplore.ieee.org
Cryptography is the central component of a large number of security solutions. However,
most of the existing algorithms do not take into consideration the structure of data, its size …

[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …