Design of highly nonlinear substitution boxes based on I-Ching operators

T Zhang, CLP Chen, L Chen, X Xu… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
This paper is to design substitution boxes (S-Boxes) using innovative I-Ching operators
(ICOs) that have evolved from ancient Chinese I-Ching philosophy. These three operators …

Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization

KZ Zamli, A Kader, F Din, HS Alhadawi - Neural Computing and …, 2021 - Springer
Cryptography often involves substituting (and converting) the secret information into dummy
data so that it could reach the desired destination without leakage. Within symmetric key …

A New 1D Chaotic Map and -Hill Climbing for Generating Substitution-Boxes

AA Alzaidi, M Ahmad, MN Doja, E Al Solami… - IEEE …, 2018 - ieeexplore.ieee.org
One-dimensional (1-D) chaotic maps have been considered as prominent pseudo-random
source for the design of different cryptographic primitives. They have the advantages of …

Optimizing S-box generation based on the adaptive agent heroes and cowards algorithm

KZ Zamli - Expert Systems with Applications, 2021 - Elsevier
This paper introduces a new variant of a metaheuristic algorithm based on Agent Heroes
and Cowards Algorithm (AHC), called Adaptive Agent Heroes and Cowards Algorithm …

Construction of robust lightweight s-boxes using enhanced logistic and enhanced sine maps

PP Duong, HM Nguyen, BA Dao… - IEEE …, 2024 - ieeexplore.ieee.org
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as
non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis …

Redefining the transparency order

K Chakraborty, S Sarkar, S Maitra, B Mazumdar… - Designs, codes and …, 2017 - Springer
In this paper, we consider the multi-bit Differential Power Analysis (DPA) in the Hamming
weight model. In this regard, we revisit the definition of Transparency Order (TO TO) from the …

Security analysis of logic encryption against the most effective side-channel attack: DPA

M Yasin, B Mazumdar, SS Ali… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Logic encryption has recently gained interest as a countermeasure against IP piracy and
reverse engineering attacks. A secret key is used to lock/encrypt an IC such that the IC will …

Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes

S Picek, K Papagiannopoulos, B Ege, L Batina… - … on Cryptology in India, 2014 - Springer
When studying the DPA resistance of S-boxes, the research community is divided in their
opinions on what properties should be considered. So far, there exist only a few properties …

Design of highly nonlinear confusion component based on entangled points of quantum spin states

H Muhammad Waseem, SO Hwang - Scientific Reports, 2023 - nature.com
Cryptosystems are commonly deployed to secure data transmission over an insecure line of
communication. To provide confusion in the data over insecure networks, substitution boxes …

The notion of transparency order, revisited

H Li, Y Zhou, J Ming, G Yang, C ** - The Computer Journal, 2020 - academic.oup.com
We revisit the definition of transparency order (TO) and that of modified transparency order
(MTO) as well, which were proposed to measure the resistance of substitution boxes (S …