COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction
The Substitution box (S-box) is the main nonlinear component responsible for the
cryptographic strength of any Substitution-Permutation Network (SPN) based block cipher …
cryptographic strength of any Substitution-Permutation Network (SPN) based block cipher …
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property
This paper investigates a particular family of enhanced substitution boxes for the Advanced
Encryption Standard. In contrast to the original substitution box design where each input has …
Encryption Standard. In contrast to the original substitution box design where each input has …
The Periodicity Detection of the Substitution Box in the CBC mode: Experiment and Study
Z Alimzhanova, M Skublewska-Paszkowska… - IEEE …, 2023 - ieeexplore.ieee.org
This paper presents a technique for investigating the cyclic properties of substitution boxes
(S-boxes) in the Cipher Block Chaining (CBC) mode of operation. S-boxes provide …
(S-boxes) in the Cipher Block Chaining (CBC) mode of operation. S-boxes provide …
Algorithm for Generating Robust S-Boxes Using Adjacency Matrix Parameters
J Abdurazzokov, B Abdurakhimov… - 2023 10th …, 2023 - ieeexplore.ieee.org
In modern block cipher schemes, the substitution block (S-box) acts as a key nonlinear
element that plays an important role in generating entangled entanglement in the creation of …
element that plays an important role in generating entangled entanglement in the creation of …
Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications.
Various mobile devices and applications are now used in daily life. These devices require
high-speed data processing, low energy consumption, low communication latency, and …
high-speed data processing, low energy consumption, low communication latency, and …
[HTML][HTML] QuantumGS-Box—A Key-Dependent GA and QRNG-Based S-Box for High-Speed Cloud-Based Storage Encryption
A Saini, A Tsokanos, R Kirner - Sci, 2024 - mdpi.com
Cloud computing has revolutionized the digital era by providing a more efficient, scalable,
and cost-effective infrastructure. Secure systems that encrypt and protect data before it is …
and cost-effective infrastructure. Secure systems that encrypt and protect data before it is …
A Lightweight Image Encryption Algorithm Based on Secure Key Generation
Data confidentiality and security are important issues due to the sensitivity of the data and its
relationship with users' privacy. Sensitive data includes images and texts that can be …
relationship with users' privacy. Sensitive data includes images and texts that can be …
A dynamic S-box algorithm based on special supersingular elliptic curve
Recent research on substitution boxes (S-boxes) has highlighted the need for improved
security and efficiency in cryptographic algorithms. This article addresses the limitations of …
security and efficiency in cryptographic algorithms. This article addresses the limitations of …
Fast image encryption algorithm with random structures
Block encryption algorithms are among the most preferred applications in cryptographic
systems. Block ciphers should have accomplished some requirements for a secure …
systems. Block ciphers should have accomplished some requirements for a secure …
Substitution Layer Analysis of NIST Lightweight Cryptography Competition Finalists
From the start of the 21st century, resource-constrained devices like smart cards, RFID tags
and SCADA systems have been utilized commonly in security-critical systems. This vast …
and SCADA systems have been utilized commonly in security-critical systems. This vast …