Cited by 51
Key-Dependent S-Box Generation in AES Block Cipher System

ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
Athmane Seghier, Jianxin Li
Conference:  (2019), p. 1
S-Box Design
William Easttom
Book:  (2021), p. 187
2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)
Chuck Easttom
Conference:  (2018), p. 444
Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known Attacks
L. N. Pradeep, Aniruddha Bhattacharjya
Book:  Communications in Computer and Information Science (Security in Computing and Communications) Volume 377 (2013), p. 63
2015 International Conference on Computing Communication Control and Automation
Vikas Kaul, V.A. Bharadi, P. Choudhari, Dhvani Shah, S.K. Narayankhedkar
Conference:  (2015), p. 95
2016 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC)
K. Kalaiselvi, Anand Kumar
Conference:  (2016), p. 1
2014 International Conference on Computational Science and Technology (ICCST)
Farshid Hossein Nejad, Saman Sabah, Amid Jamshidi Jam
Conference:  (2014), p. 1
2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence)
Vikas Kaul, Prerana Choudhari, S K Narayankhedkar
Conference:  (2014), p. 373
Generation of AES-like 8-bit Random S-Box and Comparative Study on Randomness of Corresponding Ciphertexts with Other 8-bit AES S-Boxes
S. Das
Book:  Advances in Intelligent Systems and Computing (Intelligent Computing, Networking, and Informatics) Volume 243 (2014), p. 303
2018 15th International Multi-Conference on Systems, Signals & Devices (SSD)
Tarek Farah, Rhouma Rhouma, Safya Belghith
Conference:  (2018), p. 1155
2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)
Abdelrahman Altigani, Shafaatunnur Hasan, Bazara Barry, Siti Mariyam Shamsuddin
Conference:  (2018), p. 1
2019 International Conference on Communication and Electronics Systems (ICCES)
Yashvir Singh Chauhan, T.N. Sasamal
Conference:  (2019), p. 468
2021 International Telecommunications Conference (ITC-Egypt)
Wageda I. El Sobky, Abdelkader A. Isamail, Ashraf S. Mohra, Ayman M. Hassan
Conference:  (2021), p. 1
s-box Design
Chuck Easttom
Book:  (2022), p. 193
Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) Against Differential Cryptanalysis
Shah Fahd, Mehreen Afzal, Dawood Shah, Waseem Iqbal, Atiya Hai
Book:  Lecture Notes in Computer Science (Foundations and Practice of Security) Volume 13877 (2023), p. 461
SISA En-Decryption Algorithm for Multilingual Data Privacy and Security in IoT
Sivasakthi Kannan, Manju C. Thayammal, Sherly Alphonse, Priyanga, S. Abinaya
Book:  Advances in Information Security, Privacy, and Ethics (Emerging Technologies for Securing the Cloud and IoT) (2024), p. 283
2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS)
Korkonda Srivaishnavi, Gorigapudi Sowmya, P Laxmikanth, Manchalla O V P Kumar, Kiran Mannem
Conference:  (2024), p. 1
Electrical Engineering (ICEE), Iranian Conference on
Chuck Easttom
Conference:  (2018), p. 1658
A Novel Algebraic Technique for Design of Computational Substitution-Boxes Using Action of Matrices on Galois Field
Nasir Siddiqui, Hira Khalid, Fiza Murtaza, Muhammad Ehatisham-Ul-Haq, Muhammad Awais Azam
Journal:  IEEE Access Volume 8 (2020), p. 197630
A Novel Encryption Scheme in Ship Remote Control against Differential Fault Attack
Hong Zeng, Tianjian Wang, Jundong Zhang, Dehao Li, Di Shang
Journal:  Applied Sciences Volume 12, Issue 16 (2022), p. 8278
A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups
Abdul Razaq, Hanan Alolaiyan, Musheer Ahmad, Muhammad Awais Yousaf, Umer Shuaib, Waqar Aslam, Moatsum Alawida
Journal:  IEEE Access Volume 8 (2020), p. 75473
A Polymorphic Advanced Encryption Standard – A Novel Approach
Abdelrahman Altigani, Shafaatunnur Hasan, Bazara Barry, Shiraz Naserelden, Muawia A. Elsadig, Huwaida T. Elshoush
Journal:  IEEE Access Volume 9 (2021), p. 20191
A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things
Ahmed J. Hintaw, Selvakumar Manickam, Shankar Karuppayah, Mohammad Adnan Aladaileh, Mohammed Faiz Aboalmaaly, Shams Ul Arfeen Laghari
Journal:  IEEE Access Volume 11 (2023), p. 43019
A group theoretic construction of highly nonlinear substitution box and its applications in image encryption
Abdul Razaq, Shumaila Akhter, Awais Yousaf, Umer Shuaib, Musheer Ahmad
Journal:  Multimedia Tools and Applications Volume 81, Issue 3 (2022), p. 4163
A novel algebraic construction of strong S-boxes over double GF(27) structures and image protection
Abdul Razaq, Musheer Ahmad, Ahmed A. Abd El-Latif
Journal:  Computational and Applied Mathematics Volume 42, Issue 2 (2023)
A secure key dependent dynamic substitution method for symmetric cryptosystems
Aisha Ejaz, Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf, Afshan Kanwal
Journal:  PeerJ Computer Science Volume 7 (2021), p. e587
AES Security Improvement by Utilizing New Key-Dependent XOR Tables
Tran Thi Luong, Nguyen Ngoc Cuong, Bay Vo
Journal:  IEEE Access Volume 12 (2024), p. 53158
An Innovative Feasible Approach for Multi-Media Security Using Both Chaotic and Elliptic Curve Structures
Tanveer Qayyum, Tariq Shah, Ali Yahya Hummdi, Amer Aljaedi, Zaid Bassfar
Journal:  IEEE Access Volume 12 (2024), p. 10411
Block Cipher’s Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight’s Tour Chain
Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla, Vijay Kumar
Journal:  Computational Intelligence and Neuroscience Volume 2022 (2022), p. 1
Computationally efficient selective video encryption with chaos based block cipher
Muhammad Altaf, Ayaz Ahmad, Farman Ali Khan, Zahoor Uddin, Xiaodong Yang
Journal:  Multimedia Tools and Applications Volume 77, Issue 21 (2018), p. 27981
Construction of highly non linear component of block cipher based on mclaurin series and mellin transformation with application in image encryption
Abid Mahboob, Imran Siddique, Muhammad Asif, Muhammad Nadeem, Aysha Saleem
Journal:  Multimedia Tools and Applications Volume 83, Issue 3 (2024), p. 7159
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Praveen Agarwal, Amandeep Singh, Adem Kilicman
Journal:  Advances in Mechanical Engineering Volume 10, Issue 7 (2018)
Efficient and secure substitution box and random number generators over Mordell elliptic curves
Ikram Ullah, Naveed Ahmed Azam, Umar Hayat
Journal:  Journal of Information Security and Applications Volume 56 (2021), p. 102619
Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field
Naveed Ahmed Azam, Umar Hayat, Ikram Ullah
Journal:  Frontiers of Information Technology & Electronic Engineering Volume 20, Issue 10 (2019), p. 1378
Generation and Evaluation of a New Time-Dependent Dynamic S-Box Algorithm for AES Block Cipher Cryptosystems
Hayder T. Assafli, Ivan A. Hashim
Journal:  IOP Conference Series: Materials Science and Engineering Volume 978 (2020), p. 012042
Generation of AES S-boxes with Various Modulus and Additive Constant Polynomials and Testing their Randomization
S. Das, J.K.M.S. Uz Zaman, R. Ghosh
Journal:  Procedia Technology Volume 10 (2013), p. 957
Generation of Highly Nonlinear and Dynamic AES Substitution-Boxes (S-Boxes) Using Chaos-Based Rotational Matrices
Muhammad Sarmad Mahmood Malik, Muhammad Asim Ali, Muhammad Asif Khan, Muhammad Ehatisham-Ul-Haq, Syed Nasir Mehmood Shah, Mobashar Rehman, Waqar Ahmad
Journal:  IEEE Access Volume 8 (2020), p. 35682
Human Psychological Disorder towards Cryptography: True Random Number Generator from EEG of Schizophrenics and Its Application in Block Encryption’s Substitution Box
Muhammad Fahad Khan, Khalid Saleem, Mohammad Mazyad Hazzazi, Mohammed Alotaibi, Piyush Kumar Shukla, Muhammad Aqeel, Seda Arslan Tuncer, Arpit Bhardwaj
Journal:  Computational Intelligence and Neuroscience Volume 2022 (2022), p. 1
Image Encryption Using Elliptic Curves and Rossby/Drift Wave Triads
Ikram Ullah, Umar Hayat, Miguel D. Bustamante
Journal:  Entropy Volume 22, Issue 4 (2020), p. 454
Intelligent security algorithm for UNICODE data privacy and security in IOT
Balajee Maram, J. M. Gnanasekar, Gunasekaran Manogaran, M. Balaanand
Journal:  Service Oriented Computing and Applications Volume 13, Issue 1 (2019), p. 3
Multilevel information fusion for cryptographic substitution box construction based on inevitable random noise in medical imaging
Muhammad Fahad Khan, Khalid Saleem, Mohammed Ali Alshara, Shariq Bashir
Journal:  Scientific Reports Volume 11, Issue 1 (2021)
Next-Generation Block Ciphers: Achieving Superior Memory Efficiency and Cryptographic Robustness for IoT Devices
Saadia Aziz, Ijaz Ali Shoukat, Mohsin Iftikhar, Mohsin Murtaza, Abdulmajeed M. Alenezi, Cheng-Chi Lee, Imran Taj
Journal:  Cryptography Volume 8, Issue 4 (2024), p. 47
PROVING THE SECURITY OF AES BLOCK CIPHER BASED ON MODIFIED MIXCOLUMN
Luong Tran Thi
Journal:  Journal of Computer Science and Cybernetics Volume 40, Issue 2 (2024), p. 187
Parametrization of generalized triangle groups and construction of substitution-box for medical image encryption
Aqsa Zafar Abbasi, Ayesha Rafiq, Lioua Kolsi
Journal:  Journal of King Saud University - Computer and Information Sciences Volume 36, Issue 8 (2024), p. 102159
Randomized Substitution Method for Effectively Secure Block Ciphers in I.O.T Environment
Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf, Muhammad Rehan Faheem
Journal:  Arabian Journal for Science and Engineering Volume 45, Issue 12 (2020), p. 11019
Research of Lyapunov exponent of S-boxes
Zang Hong-Yan, Fan Xiu-Bin, Min Le-Quan, Han Dan-Dan
Journal:  Acta Physica Sinica Volume 61, Issue 20 (2012), p. 200508
TRESC: Towards redesigning existing symmetric ciphers
Hassan N. Noura, Ola Salman, Nesrine Kaaniche, Nicolas Sklavos, Ali Chehab, Raphaël Couturier
Journal:  Microprocessors and Microsystems Volume 87 (2021), p. 103478
The LBC-3 lightweight encryption algorithm
Saule Nyssanbayeva, Nursulu Kapalova, Armiyanbek Haumen, Olzhas Suleimenov
Journal:  Open Engineering Volume 12, Issue 1 (2022), p. 570
Two-Key Dependent Permutation for Use in Symmetric Cryptographic System
Arulmani Kuppusamy, Swaminathan Pitchai Iyer, Kannan Krithivasan
Journal:  Mathematical Problems in Engineering Volume 2014 (2014), p. 1
Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES
Mona Dara, Kooroush Manochehri
Journal:  Information Security Journal: A Global Perspective Volume 23, Issue 1-2 (2014), p. 1
Yoyo trick on type‐II generalised Feistel networks
Tao Hou, Ting Cui
Journal:  IET Information Security Volume 15, Issue 6 (2021), p. 457