Region of interest-based medical image encryption technique based on chaotic S-boxes

SS Jamal, MM Hazzazi, MF Khan, Z Bassfar… - Expert Systems with …, 2024 - Elsevier
Block cipher has been one of the most reliable options by which data security is achieved.
The strength of block cipher against various attacks is purely dependent on its confusion …

Designing S-box using tent-sine chaotic system while combining the traits of tent and sine map

AW Malik, AH Zahid, DS Bhatti, HJ Kim, KI Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Secure exchange of sensitive information between different entities is a serious challenge in
today's environment. Therefore, various cryptosystems have been created specifically for …

Construction of multivalued cryptographic boolean function using recurrent neural network and its application in image encryption scheme

N Abughazalah, A Latif, MW Hafiz, M Khan… - Artificial Intelligence …, 2023 - Springer
The construction and development of new techniques for a nonlinear multivalued Boolean
function is one of the important aspects of modern ciphers. These multivalued Boolean …

A novel 4D hyperchaotic system assisted josephus permutation for secure substitution-box generation

A Alkhayyat, M Ahmad, N Tsafack, M Tanveer… - Journal of Signal …, 2022 - Springer
Hyperchaotic systems found to exhibit better dynamics and behaviors compared to chaotic
systems due to great possibility of simultaneous exponential expansion of their system's …

Construction and optimization of dynamic s-boxes based on gaussian distribution

AR Alharbi, SS Jamal, MF Khan, MA Gondal… - IEEE …, 2023 - ieeexplore.ieee.org
Block ciphers are widely used for securing data and are known for their resistance to various
types of attacks. The strength of a block cipher against these attacks often depends on the S …

Design of highly nonlinear confusion component based on entangled points of quantum spin states

H Muhammad Waseem, SO Hwang - Scientific Reports, 2023 - nature.com
Cryptosystems are commonly deployed to secure data transmission over an insecure line of
communication. To provide confusion in the data over insecure networks, substitution boxes …

Block cipher's substitution box generation based on natural randomness in underwater acoustics and knight's tour chain

MF Khan, K Saleem, T Shah… - Computational …, 2022 - Wiley Online Library
The protection of confidential information is a global issue, and block encryption algorithms
are the most reliable option for securing data. The famous information theorist, Claude …

[PDF][PDF] Novel substitution-box generation using group theory for secure medical image encryption in E-healthcare

A Razaq, LA Maghrabi, M Ahmad, QH Naith - AIMS Math, 2024 - core.ac.uk
Novel substitution-box generation using group theory for secure medical image encryption in
E-healthcare Page 1 AIMS Mathematics, 9(3): 6207–6237. DOI: 10.3934/math.2024303 …

Constructing Highly Nonlinear Cryptographic Balanced Boolean Functions on Learning Capabilities of Recurrent Neural Networks

HM Waseem, MA Hafeez, S Ahmed, BD Deebak… - IEEE …, 2024 - ieeexplore.ieee.org
This study presents a novel approach to cryptographic algorithm design that harnesses the
power of recurrent neural networks. Unlike traditional mathematical-based methods, neural …

Current-state opacity verification in discrete event systems using an observer net

A Labed, I Saadaoui, N Wu, J Yu, Z Li - Scientific Reports, 2022 - nature.com
Due to the proliferation of contemporary computer-integrated systems and communication
networks, there is more concern than ever regarding privacy, given the potential for sensitive …