The paper presents a general framework for improving the security of the cryptosystem based on the symmetric block cipher. The main idea is based on possibility of chancing substitution boxes (called S-boxes) in encryption/decryption algorithm. In order to make it possible, it is necessary to generate identical boxes by an encryption and decryption party. This is the main reason, why deterministic methods of generating substitution boxes based on the pseudorandom sequences will be presented
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
S-Boxes are the key components of many cryptographic primitives and designing them to improve resili...
Although many ciphers use fixed, close to ideal, s-boxes (like AES e.g.), random s-boxes offer an in...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
The protection of confidential information is a global issue and block encryption algorithms are the...
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-li...
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy ...
Block ciphers are widely used in modern cryptography. Substitution boxes (S-boxes) are main elements...
AbstractThe focus of this article is to construct substitution box based on tangent delay for ellipt...
Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
This paper represents a developed cryptographic information protection algorithm based on an substit...
This article presents one of the main transformations of symmetric block ciphers used to protect con...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
In cryptography, Block ciphers use S-Boxes to perform substitution and permutation operations on a d...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
S-Boxes are the key components of many cryptographic primitives and designing them to improve resili...
Although many ciphers use fixed, close to ideal, s-boxes (like AES e.g.), random s-boxes offer an in...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
The protection of confidential information is a global issue and block encryption algorithms are the...
Substitution boxes (S-boxes) play a crucial role in modern cryptographic algorithms, providingnon-li...
A Substitution box (S-box) is an important component used in symmetric key cryptosystems to satisfy ...
Block ciphers are widely used in modern cryptography. Substitution boxes (S-boxes) are main elements...
AbstractThe focus of this article is to construct substitution box based on tangent delay for ellipt...
Substitution boxes are important parts in many block and stream ciphers. The emergence of a range of...
Substitution Boxes (S-Boxes) are crucial components in the design of many symmetric ciphers. The sec...
This paper represents a developed cryptographic information protection algorithm based on an substit...
This article presents one of the main transformations of symmetric block ciphers used to protect con...
Substitution boxes (S-boxes) are a crucial component of DES-like block ciphers. This research addres...
In cryptography, Block ciphers use S-Boxes to perform substitution and permutation operations on a d...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
S-Boxes are the key components of many cryptographic primitives and designing them to improve resili...
Although many ciphers use fixed, close to ideal, s-boxes (like AES e.g.), random s-boxes offer an in...