SummarySymmetric encryption has been a standout amongst the most reliable option by which security is accomplished. In modern block symmetric cyphers, the substitution-boxes have been playing a critical role of nonlinear components that drives the actual security of cyphers. In this paper, the travelling salesman problem and piece-wise linear chaotic map are explored to synthesize an efficient configuration of 8×8 substitution-box. The proposed anticipated design has the consistency which is justified by the standard performance indexes. The statistical results manifest that the prospective substitution-box is cryptographically more impressive as compared to some recent investigations
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
Substitution boxes are essential nonlinear components responsible to impart strong confusion and sec...
The protection of confidential information is a global issue and block encryption algorithms are the...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
AbstractEfficient substitution boxes have crucial importance in the design of cryptographically stro...
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
Secure exchange of sensitive information between different entities is a serious challenge in today&...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
At a fundamental level, the security of symmetric key cryptosystems ties back to Claude Shannon\u27s...
AbstractThe focus of this article is to construct substitution box based on tangent delay for ellipt...
The paper presents a general framework for improving the security of the cryptosystem based on the s...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
Substitution boxes are essential nonlinear components responsible to impart strong confusion and sec...
The protection of confidential information is a global issue and block encryption algorithms are the...
Symmetric encryption has been a standout amongst the most reliable option by which security is accom...
SummarySymmetric encryption has been a standout amongst the most reliable option by which security i...
AbstractEfficient substitution boxes have crucial importance in the design of cryptographically stro...
This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4...
As the motivations and capabilities of threat actors continue to evolve, providing data security has...
Secure exchange of sensitive information between different entities is a serious challenge in today&...
In most modern symmetric ciphers, substitution boxes are non-linear core components that provide rob...
At a fundamental level, the security of symmetric key cryptosystems ties back to Claude Shannon\u27s...
AbstractThe focus of this article is to construct substitution box based on tangent delay for ellipt...
The paper presents a general framework for improving the security of the cryptosystem based on the s...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
Substitution boxes are essential nonlinear components responsible to impart strong confusion and sec...
The protection of confidential information is a global issue and block encryption algorithms are the...