Substitution Box (S-Box) is one of the most significant structures used to create an encryption which is strong and resistant against attacks in block encryption algorithms. S-Box plays an important role in data encryption. This paper presents a novel S-Box generation algorithm design based on scaled Zhongtang chaotic system. In this study, a new random number generator which uses the new scaled Zhongtang chaotic system with very complicated and interesting dynamic features is designed; also, a new effective and strong S-Box design algorithm utilizing this RNG (random number generator) is developed. Bits generated by RNG are put to NIST tests and they passed all the NIST tests. Non-linearity, bit independence criteria, strict avalanche crit...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
Secure exchange of sensitive information between different entities is a serious challenge in today&...
In this study, an encryption algorithm that uses chaos based S-BOX is developed for secure and speed...
S-box is one of the most significant structures used to construct encryption that is strong and resi...
A novel construction method for a random S-box by using the spatiotemporal nonlinear chaotic system ...
A new method for obtaining random bijective S-boxes based on improved one-dimensional discrete chaot...
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) p...
In this study, a novel chaos-based hybrid encryption algorithm design for secure and effective image...
The rapid and extensive usage of Internet in the present decade has put forth information security a...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
Data security is a major issue because of rapid evolution of data communication over unsecured inter...
The chaotic system has a characteristically random behavior by nature, and these systems have their...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
Secure exchange of sensitive information between different entities is a serious challenge in today&...
In this study, an encryption algorithm that uses chaos based S-BOX is developed for secure and speed...
S-box is one of the most significant structures used to construct encryption that is strong and resi...
A novel construction method for a random S-box by using the spatiotemporal nonlinear chaotic system ...
A new method for obtaining random bijective S-boxes based on improved one-dimensional discrete chaot...
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) p...
In this study, a novel chaos-based hybrid encryption algorithm design for secure and effective image...
The rapid and extensive usage of Internet in the present decade has put forth information security a...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
Data security is a major issue because of rapid evolution of data communication over unsecured inter...
The chaotic system has a characteristically random behavior by nature, and these systems have their...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...