A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field
Cryptography is commonly used to secure communication and data transmission over
insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …
insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …
A novel construction of efficient substitution-boxes using cubic fractional transformation
A symmetric block cipher employing a substitution–permutation duo is an effective technique
for the provision of information security. For substitution, modern block ciphers use one or …
for the provision of information security. For substitution, modern block ciphers use one or …
An innovative design of substitution-boxes using cubic polynomial map**
In this paper, we propose to present a novel technique for designing cryptographically
strong substitution-boxes using cubic polynomial map**. The proposed cubic polynomial …
strong substitution-boxes using cubic polynomial map**. The proposed cubic polynomial …
Cryptanalysis of novel image encryption scheme based on multiple chaotic substitution boxes
In current years many chaos-based Substitution boxes (S-boxes) have been proposed.
Recently, an image encryption technique based on multiple chaotic S-box was offered. This …
Recently, an image encryption technique based on multiple chaotic S-box was offered. This …
Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices
MSM Malik, MA Ali, MA Khan… - IEEE …, 2020 - ieeexplore.ieee.org
This work reports a novel chaos-based affine transformation generation method, which is
based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …
based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …
Algorithm for generating s-boxes with prescribed differential properties
S Marochok, P Zajac - Algorithms, 2023 - mdpi.com
Cryptographic S-boxes are vectorial Boolean functions that must fulfill strict criteria to
provide security for cryptographic algorithms. There are several existing methods for …
provide security for cryptographic algorithms. There are several existing methods for …
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property
This paper investigates a particular family of enhanced substitution boxes for the Advanced
Encryption Standard. In contrast to the original substitution box design where each input has …
Encryption Standard. In contrast to the original substitution box design where each input has …
A new improved AES S-box with enhanced properties
Abstract The Advanced Encryption Standard (AES) is the most widely used symmetric
encryption algorithm. Its security is mainly based on the structure of the S-box. In this paper …
encryption algorithm. Its security is mainly based on the structure of the S-box. In this paper …
Efficient image encryption algorithm based on dynamic high-performance S-box and hyperchaotic system
Y Su, X Tong, M Zhang, Z Wang - Physica Scripta, 2023 - iopscience.iop.org
With the development of information technology, security, low latency, and instant
messaging have become a major demand. To solve this problem, this paper designs a …
messaging have become a major demand. To solve this problem, this paper designs a …
Review on improvement of advanced encryption standard (AES) algorithm based on time execution, differential cryptanalysis and level of security
Multimedia data (text, audio, image, animation and video) have been widely used in the past
few years for advanced digital content transmission. With the network technology focusing …
few years for advanced digital content transmission. With the network technology focusing …