Cited by 29
An Algorithm for Key-Dependent S-Box Generation in Block Cipher System

2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS)
Korkonda Srivaishnavi, Gorigapudi Sowmya, P Laxmikanth, Manchalla O V P Kumar, Kiran Mannem
Conference:  (2024), p. 1
SISA En-Decryption Algorithm for Multilingual Data Privacy and Security in IoT
Sivasakthi Kannan, Manju C. Thayammal, Sherly Alphonse, Priyanga, S. Abinaya
Book:  Advances in Information Security, Privacy, and Ethics (Emerging Technologies for Securing the Cloud and IoT) (2024), p. 283
2020 International Conference on Advanced Computer Science and Information Systems (ICACSIS)
Ronniel D. Labio, Enrique D. Festijo
Conference:  (2020), p. 27
2018 International Conference on Communication and Signal Processing (ICCSP)
Basavaraj P. Halagali, Veena V. Desai
Conference:  (2018), p. 0165
2020 8th International Symposium on Digital Forensics and Security (ISDFS)
Hassan N. Noura, Ali Chehab, Raphael Couturier
Conference:  (2020), p. 1
Hybrid intelligence-based cryptosystem
Anirban Bhowmik, Sunil Karforma
Book:  (2023), p. 315
2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)
Randy Kuang, Dafu Lou, Alex He, Alexandre Conlon
Conference:  (2021), p. 790
2019 5th International Conference on Optimization and Applications (ICOA)
Amandeep Singh, Praveen Agarwal, Mehar Chand
Conference:  (2019), p. 1
ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
Athmane Seghier, Jianxin Li
Conference:  (2019), p. 1
Electrical Engineering (ICEE), Iranian Conference on
Chuck Easttom
Conference:  (2018), p. 1658
A Novel Modular Approach Based Substitution-Box Design for Image Encryption
Amjad Hussain Zahid, Eesa Al-Solami, Musheer Ahmad
Journal:  IEEE Access Volume 8 (2020), p. 150326
A new construction of confusion component of block ciphers
Khawaja Muhammad Ali, Majid Khan
Journal:  Multimedia Tools and Applications Volume 78, Issue 22 (2019), p. 32585
A novel method to generate key-dependent s-boxes with identical algebraic properties
Ahmad Y. Al-Dweik, Iqtadar Hussain, Moutaz Saleh, M.T. Mustafa
Journal:  Journal of Information Security and Applications Volume 64 (2022), p. 103065
A novel symmetric image cryptosystem resistant to noise perturbation based on S8 elliptic curve S-boxes and chaotic maps
Haris Aziz, Syed Mushhad Mustuzhar Gilani, Iqtadar Hussain, Muhammad Azeem Abbas
Journal:  The European Physical Journal Plus Volume 135, Issue 11 (2020)
A secure key dependent dynamic substitution method for symmetric cryptosystems
Aisha Ejaz, Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf, Afshan Kanwal
Journal:  PeerJ Computer Science Volume 7 (2021), p. e587
ABC Optimization Based Construction of Strong Substitution-Boxes
Musheer Ahmad, M. N. Doja, M. M. Sufyan Beg
Journal:  Wireless Personal Communications Volume 101, Issue 3 (2018), p. 1715
Advanced encryption standard based on key dependent S‐Box cube
Athmane Seghier, Jianxin Li, Da Zhi Sun
Journal:  IET Information Security Volume 13, Issue 6 (2019), p. 552
Algorithm for Generating S-Boxes with Prescribed Differential Properties
Stanislav Marochok, Pavol Zajac
Journal:  Algorithms Volume 16, Issue 3 (2023), p. 157
An Innovative Design of Substitution-Boxes Using Cubic Polynomial Mapping
Amjad Hussain Zahid, Muhammad Junaid Arshad
Journal:  Symmetry Volume 11, Issue 3 (2019), p. 437
Application Based Construction and Optimization of Substitution Boxes Over 2D Mixed Chaotic Maps
Khawaja Muhammad Ali, Majid Khan
Journal:  International Journal of Theoretical Physics Volume 58, Issue 9 (2019), p. 3091
Constructing keyed strong S-Box with higher nonlinearity based on 2D hyper chaotic map and algebraic operation
Yuanyuan Si, Hongjun Liu, Mengdi Zhao
Journal:  Integration Volume 88 (2023), p. 269
Design of Nonlinear Components Over a Mordell Elliptic Curve on Galois Fields
Anwer Mustafa Hilal, Fahd N. Al-Wesabi, Mohammed Alamgeer, Manar Ahmed Hamza, Mohammad Mahzari, Murad A. Almekhlafi
Journal:  Computers, Materials & Continua Volume 71, Issue 1 (2022), p. 1313
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Noor Afiza Ariffin Mohd, Aymen Yousef Ahmed Ashawesh
Journal:  Journal of Physics: Conference Series Volume 1793, Issue 1 (2021), p. 012066
Enhancement of Non-Permutation Binomial Power Functions to Construct Cryptographically Strong S-Boxes
Herman Isa, Syed Alwee Aljunid Syed Junid, Muhammad Reza Z’aba, Rosdisham Endut, Syed Mohammad Ammar, Norshamsuri Ali
Journal:  Mathematics Volume 11, Issue 2 (2023), p. 446
FibGeoPresent: A Highly Secured and Geographic Coordinate System Based Authenticated Lightweight Block Cipher for Smart System
M. Girija, P. Manickam, M. Ramaswami
Journal:  Wireless Personal Communications Volume 127, Issue 3 (2022), p. 2211
Intelligent security algorithm for UNICODE data privacy and security in IOT
Balajee Maram, J. M. Gnanasekar, Gunasekaran Manogaran, M. Balaanand
Journal:  Service Oriented Computing and Applications Volume 13, Issue 1 (2019), p. 3
Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher
Hafeez ur Rehman, Tariq Shah, Mohammad Mazyad Hazzazi, Ali Alshehri, Bassfar Zaid
Journal:  Computers, Materials & Continua Volume 73, Issue 2 (2022), p. 2913
New Key-Dependent S-Box Generation Algorithm on AES
Proteeti Das, Najmul Hoque Munshi, Subhasis Maitra
Journal:  Micro and Nanosystems Volume 14, Issue 3 (2022), p. 263
Randomized Substitution Method for Effectively Secure Block Ciphers in I.O.T Environment
Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf, Muhammad Rehan Faheem
Journal:  Arabian Journal for Science and Engineering Volume 45, Issue 12 (2020), p. 11019