Secure exchange of sensitive information between different entities is a serious challenge in today’s environment. Therefore, various cryptosystems have been created specifically for this purpose. Various operations are used in these cryptosystems. The most common operations used are substitution and permutation. The substitution-box (S-box), a look-up table that takes x bits as input and replaces them with y bits, is responsible for the substitution operation. The construction of an S-box with strong cryptographic attributes is an essential part of building a robust and secure cryptosystem.Numerous researchers have dedicated their efforts to devising intricate techniques for constructing S-boxes. In this study, a novel approach is p...
The rapid and extensive usage of Internet in the present decade has put forth information security a...
In this paper, we present a novel method to construct cryptographically strong bijective substitutio...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) p...
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4...
Substitution Box (S-Box) is one of the most significant structures used to create an encryption whic...
Substitution boxes are essential nonlinear components responsible to impart strong confusion and sec...
The protection of sensitive data from illegitimate users is one of the main challenges in today ...
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4...
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for th...
The chaotic system has a characteristically random behavior by nature, and these systems have their...
A new method for obtaining random bijective S-boxes based on improved one-dimensional discrete chaot...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
As the unique nonlinear component of block ciphers, Substitution box (S-box) directly affects the sa...
The rapid and extensive usage of Internet in the present decade has put forth information security a...
In this paper, we present a novel method to construct cryptographically strong bijective substitutio...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) p...
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4...
Substitution Box (S-Box) is one of the most significant structures used to create an encryption whic...
Substitution boxes are essential nonlinear components responsible to impart strong confusion and sec...
The protection of sensitive data from illegitimate users is one of the main challenges in today ...
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4...
New era ciphers employ substitution boxes (S-boxes) which assist in the provision of security for th...
The chaotic system has a characteristically random behavior by nature, and these systems have their...
A new method for obtaining random bijective S-boxes based on improved one-dimensional discrete chaot...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
As the unique nonlinear component of block ciphers, Substitution box (S-box) directly affects the sa...
The rapid and extensive usage of Internet in the present decade has put forth information security a...
In this paper, we present a novel method to construct cryptographically strong bijective substitutio...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...