Abstract Block cipher has been a standout amongst the most reliable option by which data security is accomplished. Block cipher strength against various attacks relies on substitution boxes. In literature, extensively algebraic structures, and chaotic systems-based techniques are available to design the cryptographic substitution boxes. Although, algebraic and chaotic systems-based approaches have favorable characteristics for the design of substitution boxes, but on the other side researchers have also pointed weaknesses in these approaches. First-time multilevel information fusion is introduced to construct the substitution boxes, having four layers; Multi Sources, Multi Features, Nonlinear Multi Features Whitening and Substitution Boxes ...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream ci...
Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream ci...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an imag...
Chaotic systems are vital in designing contemporary cryptographic systems. This study proposes an in...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
Secure exchange of sensitive information between different entities is a serious challenge in today&...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
The protection of confidential information is a global issue and block encryption algorithms are the...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream ci...
Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream ci...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an imag...
Chaotic systems are vital in designing contemporary cryptographic systems. This study proposes an in...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
Secure exchange of sensitive information between different entities is a serious challenge in today&...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
The protection of confidential information is a global issue and block encryption algorithms are the...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream ci...
Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream ci...