Automated chaos-driven s-box generation and analysis tool for enhanced cryptographic resilience

Y Aydın, F Özkaynak - IEEE Access, 2023 - ieeexplore.ieee.org
In a rapidly advancing world of technology, information security studies have become the
backbone of the digital age, and steps in this area are critical. In this context, cryptography …

A novel secure S-box design methodology based on FPGA and SHA-256 hash algorithm for block cipher algorithms

Y Aydin, AM Garipcan, F Özkaynak - Arabian Journal for Science and …, 2025 - Springer
In this study, a novel robust design methodology that successfully meets the performance
and security criteria for substitution-boxes (s-boxes), critical component in block cipher …

A novel s-box generation method based on metastable inducing over FPGA for block ciphers

AM Garipcan, Y Aydın, F Özkaynak - Knowledge-Based Systems, 2025 - Elsevier
Substitution boxes (s-boxes) providing the nonlinearity property are fundamental
components of modern encryption systems. The security of these systems directly depends …

Robustness of affine and extended affine equivalent surjective S-box (es) against differential cryptanalysis

S Fahd, M Afzal, D Shah, W Iqbal, A Hai - International Symposium on …, 2022 - Springer
Abstract A Feistel Network (FN) based block cipher relies on a Substitution Box (S-Box) for
achieving the non-linearity. S-Box is carefully designed to achieve optimal cryptographic …

On the Implementation of Mathematical Backdoors in Cryptographic Algorithms and Protocols

S Fahd - 2024 - repositories.nust.edu.pk
In a digital universe of widespread technological gadgets, cryptographic algorithms and
protocols remain integral to human beings, directly or indirectly. Followed by the recent …

A Novel S-Box Generation Method Based on Metastable Inducing Over Fpga for Block

AM GARİPCAN, Y AYDIN, F ÖZKAYNAK - Available at SSRN 4758295 - papers.ssrn.com
The security of encryption systems directly depends on the quality of the s-boxes, providing
a high level of resistance to sophisticated attack methods. Although there is no perfect …

[PDF][PDF] Logistic and Circle Maps for Robust S-Box Construction in Cryptography

Y Aydin, F Ozkaynak - 2023 - researchgate.net
Cryptology, a pivotal discipline in ensuring information security and communication
confidentiality, relies on symmetric cryptology, where the same key is employed for both …