Develo** a secure image encryption technique using a novel S-box constructed through real-coded genetic algorithm's crossover and mutation operators

D Ustun, S Sahinkaya, N Atli - Expert Systems with Applications, 2024 - Elsevier
The objective of this study is to craft a novel S-Box tailored to stringent security standards,
achieved through iterative application of crossover and mutation operators inherent to real …

A novel algorithm based on DNA coding for substitution box generation problem

F Artuğer - Neural Computing and Applications, 2024 - Springer
Substitution boxes are very important for cryptographic structures. But getting an 8-bit strong
s-box is a difficult problem. To address this problem, a new approach is proposed in this …

Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences

SMS Eldin, AAA El-Latif, SA Chelloug, M Ahmad… - IEEE …, 2023 - ieeexplore.ieee.org
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main
aim of this paper is how to increase the security level of the blockchain based on the …

Chaos and cellular automata-based substitution box and its application in cryptography

A Shafique, KH Khan, MM Hazzazi, I Bahkali, Z Bassfar… - Mathematics, 2023 - mdpi.com
Substitution boxes are the key factor in symmetric-key cryptosystems that determines their
ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have …

A strong hybrid S-box scheme based on chaos, 2D cellular automata and algebraic structure

A Haque, TA Abdulhussein, M Ahmad, MW Falah… - IEEE …, 2022 - ieeexplore.ieee.org
Substitution-boxes are the main deciding components in symmetric-key cryptosystems for
resisting many cryptanalytic attacks. It has been a challenging task for the designers to …

Fuzzy logic-based substitution-box for robust medical image encryption in telemedicine

A Razaq, LA Maghrabi, M Ahmad, F Aslam… - IEEE Access, 2024 - ieeexplore.ieee.org
Due to privacy and sensitivity of the medical images, the creation of strong medical image
encryption schemes has gained the attention of cryptographers. In this study, a robust …

Strong s-box construction approach based on Josephus problem

F Artuğer - Soft Computing, 2024 - Springer
There are two basic requirements for symmetric encryption algorithms. The first of these is
diffusion. The second and most important is confusion. In these algorithms, this requirement …

A novel secure S-box design methodology based on FPGA and SHA-256 hash algorithm for block cipher algorithms

Y Aydin, AM Garipcan, F Özkaynak - Arabian Journal for Science and …, 2025 - Springer
In this study, a novel robust design methodology that successfully meets the performance
and security criteria for substitution-boxes (s-boxes), critical component in block cipher …

Provably secure color image encryption algorithm based on FO 4D-HCS and ACM

S Ullah, X Liu, A Waheed, S Zhang - Soft Computing, 2024 - Springer
Digital image security has become a major concern due to open networks and Internet data
sharing. Many image encryption algorithms have been introduced recently for securely …

[HTML][HTML] Symmetry analysis in construction two dynamic lightweight s-boxes based on the 2d tinkerbell map and the 2d duffing map

AT Khudhair, AT Maolood, EK Gbashi - Symmetry, 2024 - mdpi.com
The lack of an S-Box in some lightweight cryptography algorithms, like Speck and Tiny
Encryption Algorithm, or the presence of a fixed S-Box in others, like Advanced Encryption …