Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Design of highly nonlinear substitution boxes based on I-Ching operators
This paper is to design substitution boxes (S-Boxes) using innovative I-Ching operators
(ICOs) that have evolved from ancient Chinese I-Ching philosophy. These three operators …
(ICOs) that have evolved from ancient Chinese I-Ching philosophy. These three operators …
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
Cryptography often involves substituting (and converting) the secret information into dummy
data so that it could reach the desired destination without leakage. Within symmetric key …
data so that it could reach the desired destination without leakage. Within symmetric key …
A New 1D Chaotic Map and -Hill Climbing for Generating Substitution-Boxes
One-dimensional (1-D) chaotic maps have been considered as prominent pseudo-random
source for the design of different cryptographic primitives. They have the advantages of …
source for the design of different cryptographic primitives. They have the advantages of …
Optimizing S-box generation based on the adaptive agent heroes and cowards algorithm
KZ Zamli - Expert Systems with Applications, 2021 - Elsevier
This paper introduces a new variant of a metaheuristic algorithm based on Agent Heroes
and Cowards Algorithm (AHC), called Adaptive Agent Heroes and Cowards Algorithm …
and Cowards Algorithm (AHC), called Adaptive Agent Heroes and Cowards Algorithm …
Construction of robust lightweight s-boxes using enhanced logistic and enhanced sine maps
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as
non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis …
non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis …
Redefining the transparency order
In this paper, we consider the multi-bit Differential Power Analysis (DPA) in the Hamming
weight model. In this regard, we revisit the definition of Transparency Order (TO TO) from the …
weight model. In this regard, we revisit the definition of Transparency Order (TO TO) from the …
Security analysis of logic encryption against the most effective side-channel attack: DPA
Logic encryption has recently gained interest as a countermeasure against IP piracy and
reverse engineering attacks. A secret key is used to lock/encrypt an IC such that the IC will …
reverse engineering attacks. A secret key is used to lock/encrypt an IC such that the IC will …
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
When studying the DPA resistance of S-boxes, the research community is divided in their
opinions on what properties should be considered. So far, there exist only a few properties …
opinions on what properties should be considered. So far, there exist only a few properties …
Design of highly nonlinear confusion component based on entangled points of quantum spin states
Cryptosystems are commonly deployed to secure data transmission over an insecure line of
communication. To provide confusion in the data over insecure networks, substitution boxes …
communication. To provide confusion in the data over insecure networks, substitution boxes …
The notion of transparency order, revisited
H Li, Y Zhou, J Ming, G Yang, C ** - The Computer Journal, 2020 - academic.oup.com
We revisit the definition of transparency order (TO) and that of modified transparency order
(MTO) as well, which were proposed to measure the resistance of substitution boxes (S …
(MTO) as well, which were proposed to measure the resistance of substitution boxes (S …