Gradient-based optimizer (gbo): a review, theory, variants, and applications
This paper introduces a comprehensive survey of a new population-based algorithm so-
called gradient-based optimizer (GBO) and analyzes its major features. GBO considers as …
called gradient-based optimizer (GBO) and analyzes its major features. GBO considers as …
Harris hawks optimization algorithm: variants and applications
This paper introduces a comprehensive survey of a new swarm intelligence optimization
algorithm so-called Harris hawks optimization (HHO) and analyzes its major features. HHO …
algorithm so-called Harris hawks optimization (HHO) and analyzes its major features. HHO …
An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges
The expansion of worldwide networking has created new possibilities for management,
development, and presentation in the form of digital data. The uncomplicated accessibility to …
development, and presentation in the form of digital data. The uncomplicated accessibility to …
A novel modular approach based substitution-box design for image encryption
In modern-day block ciphers, the role of substitution-boxes is to transform the plaintext data
nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed …
nonlinearly to generate ciphertext data with sufficient confusion. It has been well-confirmed …
Efficient key-dependent dynamic S-boxes based on permutated elliptic curves
Key-dependent dynamic substitution boxes (S-boxes) are important building blocks of many
image encryption schemes, in which a session key controls the construction of dynamic S …
image encryption schemes, in which a session key controls the construction of dynamic S …
Efficient dynamic S-box generation using linear trigonometric transformation for security applications
Protection of data transmitted over the network from illegal access is one of the major
challenges being posed by exponential growth of data in online digital communication …
challenges being posed by exponential growth of data in online digital communication …
A novel construction of dynamic S-box with high nonlinearity using heuristic evolution
For decades, the security and privacy of data are among the major challenges faced by
service providers dealing with public data. To cope with these challenges, most of the …
service providers dealing with public data. To cope with these challenges, most of the …
Cryptanalysis of novel image encryption scheme based on multiple chaotic substitution boxes
In current years many chaos-based Substitution boxes (S-boxes) have been proposed.
Recently, an image encryption technique based on multiple chaotic S-box was offered. This …
Recently, an image encryption technique based on multiple chaotic S-box was offered. This …
2D mixed pseudo-random coupling PS map lattice and its application in S-box generation
P Zhou, J Du, K Zhou, S Wei - Nonlinear Dynamics, 2021 - Springer
In this paper, firstly, we investigate a new 1D PWLCM-Sin (PS) map which derived from
PWLCM and Sin map by modulo operation. Due to the stronger parameter space, bigger …
PWLCM and Sin map by modulo operation. Due to the stronger parameter space, bigger …
A cryptographic scheme for construction of substitution boxes using quantic fractional transformation
In the new era of cryptography, Substitution Boxes (S-Boxes) are very important to raise
confusion in cipher text and the security of encryption directly depends on the algebraic …
confusion in cipher text and the security of encryption directly depends on the algebraic …