COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction

MS Jawed, M Sajid - Computer Standards & Interfaces, 2025 - Elsevier
The Substitution box (S-box) is the main nonlinear component responsible for the
cryptographic strength of any Substitution-Permutation Network (SPN) based block cipher …

Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property

A Nitaj, W Susilo, J Tonien - Computer Standards & Interfaces, 2024 - Elsevier
This paper investigates a particular family of enhanced substitution boxes for the Advanced
Encryption Standard. In contrast to the original substitution box design where each input has …

The Periodicity Detection of the Substitution Box in the CBC mode: Experiment and Study

Z Alimzhanova, M Skublewska-Paszkowska… - IEEE …, 2023 - ieeexplore.ieee.org
This paper presents a technique for investigating the cyclic properties of substitution boxes
(S-boxes) in the Cipher Block Chaining (CBC) mode of operation. S-boxes provide …

Algorithm for Generating Robust S-Boxes Using Adjacency Matrix Parameters

J Abdurazzokov, B Abdurakhimov… - 2023 10th …, 2023 - ieeexplore.ieee.org
In modern block cipher schemes, the substitution block (S-box) acts as a key nonlinear
element that plays an important role in generating entangled entanglement in the creation of …

Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications.

LW Chen, KL Tsai, FY Leu… - … in Engineering & …, 2024 - search.ebscohost.com
Various mobile devices and applications are now used in daily life. These devices require
high-speed data processing, low energy consumption, low communication latency, and …

[HTML][HTML] QuantumGS-Box—A Key-Dependent GA and QRNG-Based S-Box for High-Speed Cloud-Based Storage Encryption

A Saini, A Tsokanos, R Kirner - Sci, 2024 - mdpi.com
Cloud computing has revolutionized the digital era by providing a more efficient, scalable,
and cost-effective infrastructure. Secure systems that encrypt and protect data before it is …

A Lightweight Image Encryption Algorithm Based on Secure Key Generation

EK Gbashi, H Alaskar, AJ Hussain - IEEE Access, 2024 - ieeexplore.ieee.org
Data confidentiality and security are important issues due to the sensitivity of the data and its
relationship with users' privacy. Sensitive data includes images and texts that can be …

A dynamic S-box algorithm based on special supersingular elliptic curve

M Hussain, Z Bashir, MGA Malik - Integration, 2025 - Elsevier
Recent research on substitution boxes (S-boxes) has highlighted the need for improved
security and efficiency in cryptographic algorithms. This article addresses the limitations of …

Fast image encryption algorithm with random structures

T Etem, T Kaya - International Journal of Computers and …, 2023 - Taylor & Francis
Block encryption algorithms are among the most preferred applications in cryptographic
systems. Block ciphers should have accomplished some requirements for a secure …

Substitution Layer Analysis of NIST Lightweight Cryptography Competition Finalists

M Naseer, S Tariq, N Riaz - 2022 19th International Bhurban …, 2022 - ieeexplore.ieee.org
From the start of the 21st century, resource-constrained devices like smart cards, RFID tags
and SCADA systems have been utilized commonly in security-critical systems. This vast …