Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A novel modular approach based substitution-box design for image encryption
In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data
nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed …
nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed …
A novel construction of efficient substitution-boxes using cubic fractional transformation
A symmetric block cipher employing a substitution–permutation duo is an effective technique
for the provision of information security. For substitution, modern block ciphers use one or …
for the provision of information security. For substitution, modern block ciphers use one or …
Efficient dynamic S-box generation using linear trigonometric transformation for security applications
Protection of data transmitted over the network from illegal access is one of the major
challenges being posed by exponential growth of data in online digital communication …
challenges being posed by exponential growth of data in online digital communication …
[HTML][HTML] An innovative design of substitution-boxes using cubic polynomial map**
In this paper, we propose to present a novel technique for designing cryptographically
strong substitution-boxes using cubic polynomial map**. The proposed cubic polynomial …
strong substitution-boxes using cubic polynomial map**. The proposed cubic polynomial …
A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field
Cryptography is commonly used to secure communication and data transmission over
insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …
insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …
A novel construction of dynamic S-box with high nonlinearity using heuristic evolution
For decades, the security and privacy of data are among the major challenges faced by
service providers dealing with public data. To cope with these challenges, most of the …
service providers dealing with public data. To cope with these challenges, most of the …
Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices
MSM Malik, MA Ali, MA Khan… - Ieee …, 2020 - ieeexplore.ieee.org
This work reports a novel chaos-based affine transformation generation method, which is
based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …
based on rotational matrices to design strong key-based S-boxes. Chaotic logistic map's …
Dynamic S-box design using a novel square polynomial transformation and permutation
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of
security for the plaintext in the encryption phase and transforming the ciphertext on the …
security for the plaintext in the encryption phase and transforming the ciphertext on the …
Image encryption and analysis using dynamic AES
AES (Advanced Encryption Algorithm) is a block cipher, which is world wide implemented for
encryption of data. It has been accepted as a standard for data security since 2001. AES is a …
encryption of data. It has been accepted as a standard for data security since 2001. AES is a …
Security analysis of blowfish algorithm
A Alabaichi, F Ahmad… - 2013 Second International …, 2013 - ieeexplore.ieee.org
Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key
lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security …
lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security …