An efficient image encryption scheme based on the LSS chaotic map and single S-box
Q Lu, C Zhu, X Deng - Ieee Access, 2020 - ieeexplore.ieee.org
This paper presents an efficient and secure chaotic S-Box based image encryption
algorithm. Firstly, by cryptanalyzing a multiple chaotic S-Boxes based image encryption …
algorithm. Firstly, by cryptanalyzing a multiple chaotic S-Boxes based image encryption …
Cryptanalysis and constructing S-box based on chaotic map and backtracking
H Liu, A Kadir, C Xu - Applied Mathematics and Computation, 2020 - Elsevier
In recent years, a large number of S-Box design schemes have been proposed. However,
after detection we found that most of them contain fixed point or reverse fixed point, which …
after detection we found that most of them contain fixed point or reverse fixed point, which …
Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps
Protecting patient privacy and medical records is a legal requirement. Traditional encryption
methods fall short of handling the large volume of medical image data and their peculiar …
methods fall short of handling the large volume of medical image data and their peculiar …
An innovative design of substitution-boxes using cubic polynomial mapping
In this paper, we propose to present a novel technique for designing cryptographically
strong substitution-boxes using cubic polynomial mapping. The proposed cubic polynomial …
strong substitution-boxes using cubic polynomial mapping. The proposed cubic polynomial …
A new chaotic S-box generation method using parameter optimization of one dimensional chaotic maps
E Tanyildizi, F Özkaynak - IEEE access, 2019 - ieeexplore.ieee.org
Chaotic systems have been used to generate the substitutional box structures. The
existence of endless possibilities for the selection of the initial conditions and control …
existence of endless possibilities for the selection of the initial conditions and control …
Efficient dynamic S-box generation using linear trigonometric transformation for security applications
Protection of data transmitted over the network from illegal access is one of the major
challenges being posed by exponential growth of data in online digital communication …
challenges being posed by exponential growth of data in online digital communication …
Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications
Symmetric encryption has been considered as one of the essential means of ensuring
security of end to end communication. The robustness and strength of modern day block …
security of end to end communication. The robustness and strength of modern day block …
On the effect of chaotic system in performance characteristics of chaos based s-box designs
F Özkaynak - Physica A: Statistical Mechanics and its Applications, 2020 - Elsevier
Many cryptographic protocol have been realized using similarities between chaos and
cryptology. One of the most successful examples of these protocols has been s-box …
cryptology. One of the most successful examples of these protocols has been s-box …
A novel S-box design algorithm based on a new compound chaotic system
Q Lu, C Zhu, G Wang - Entropy, 2019 - mdpi.com
Substitution-boxes (S-Boxes) are important non-linear components in block cryptosystem,
which play an important role in the security of cryptosystems. Constructing S-Boxes with a …
which play an important role in the security of cryptosystems. Constructing S-Boxes with a …
Execution examination of chaotic S-box dependent on improved PSO algorithm
N Hematpour, S Ahadpour - Neural Computing and Applications, 2021 - Springer
Achieving proper nonlinear properties and autocorrelation in the S-box structure is an open
challenge in cryptography. Besides, there have been numerous articles on the optimization …
challenge in cryptography. Besides, there have been numerous articles on the optimization …