Login
Register
Home
Issues
Volume 26, Issue 1 (2015)
An Algorithm for Key-Dependent S-Box Gen ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
29
An Algorithm for Key-Dependent S-Box Generation in Block Cipher System
2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS)
Korkonda Srivaishnavi, Gorigapudi Sowmya, P Laxmikanth, Manchalla O V P Kumar, Kiran Mannem
https://doi.org/10.1109/ICITEICS61368.2024.10625542
Conference:
(2024), p. 1
SISA En-Decryption Algorithm for Multilingual Data Privacy and Security in IoT
Sivasakthi Kannan, Manju C. Thayammal, Sherly Alphonse, Priyanga, S. Abinaya
https://doi.org/10.4018/979-8-3693-0766-3.ch012
Book:
Advances in Information Security, Privacy, and Ethics (Emerging Technologies for Securing the Cloud and IoT)
(2024), p. 283
2020 International Conference on Advanced Computer Science and Information Systems (ICACSIS)
Ronniel D. Labio, Enrique D. Festijo
https://doi.org/10.1109/ICACSIS51025.2020.9263237
Conference:
(2020), p. 27
2018 International Conference on Communication and Signal Processing (ICCSP)
Basavaraj P. Halagali, Veena V. Desai
https://doi.org/10.1109/ICCSP.2018.8524452
Conference:
(2018), p. 0165
2020 8th International Symposium on Digital Forensics and Security (ISDFS)
Hassan N. Noura, Ali Chehab, Raphael Couturier
https://doi.org/10.1109/ISDFS49300.2020.9116441
Conference:
(2020), p. 1
Hybrid intelligence-based cryptosystem
Anirban Bhowmik, Sunil Karforma
https://doi.org/10.1016/B978-0-323-99421-7.00010-6
Book:
(2023), p. 315
2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)
Randy Kuang, Dafu Lou, Alex He, Alexandre Conlon
https://doi.org/10.1109/ICCCS52626.2021.9449247
Conference:
(2021), p. 790
2019 5th International Conference on Optimization and Applications (ICOA)
Amandeep Singh, Praveen Agarwal, Mehar Chand
https://doi.org/10.1109/ICOA.2019.8727711
Conference:
(2019), p. 1
ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
Athmane Seghier, Jianxin Li
https://doi.org/10.1109/ICC.2019.8761350
Conference:
(2019), p. 1
Electrical Engineering (ICEE), Iranian Conference on
Chuck Easttom
https://doi.org/10.1109/ICEE.2018.8472462
Conference:
(2018), p. 1658
A Novel Modular Approach Based Substitution-Box Design for Image Encryption
Amjad Hussain Zahid, Eesa Al-Solami, Musheer Ahmad
https://doi.org/10.1109/ACCESS.2020.3016401
Journal:
IEEE Access
Volume 8 (2020), p. 150326
A new construction of confusion component of block ciphers
Khawaja Muhammad Ali, Majid Khan
https://doi.org/10.1007/s11042-019-07866-w
Journal:
Multimedia Tools and Applications
Volume 78, Issue 22 (2019), p. 32585
A novel method to generate key-dependent s-boxes with identical algebraic properties
Ahmad Y. Al-Dweik, Iqtadar Hussain, Moutaz Saleh, M.T. Mustafa
https://doi.org/10.1016/j.jisa.2021.103065
Journal:
Journal of Information Security and Applications
Volume 64 (2022), p. 103065
A novel symmetric image cryptosystem resistant to noise perturbation based on S8 elliptic curve S-boxes and chaotic maps
Haris Aziz, Syed Mushhad Mustuzhar Gilani, Iqtadar Hussain, Muhammad Azeem Abbas
https://doi.org/10.1140/epjp/s13360-020-00917-4
Journal:
The European Physical Journal Plus
Volume 135, Issue 11 (2020)
A secure key dependent dynamic substitution method for symmetric cryptosystems
Aisha Ejaz, Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf, Afshan Kanwal
https://doi.org/10.7717/peerj-cs.587
Journal:
PeerJ Computer Science
Volume 7 (2021), p. e587
ABC Optimization Based Construction of Strong Substitution-Boxes
Musheer Ahmad, M. N. Doja, M. M. Sufyan Beg
https://doi.org/10.1007/s11277-018-5787-1
Journal:
Wireless Personal Communications
Volume 101, Issue 3 (2018), p. 1715
Advanced encryption standard based on key dependent S‐Box cube
Athmane Seghier, Jianxin Li, Da Zhi Sun
https://doi.org/10.1049/iet-ifs.2018.5043
Journal:
IET Information Security
Volume 13, Issue 6 (2019), p. 552
Algorithm for Generating S-Boxes with Prescribed Differential Properties
Stanislav Marochok, Pavol Zajac
https://doi.org/10.3390/a16030157
Journal:
Algorithms
Volume 16, Issue 3 (2023), p. 157
An Innovative Design of Substitution-Boxes Using Cubic Polynomial Mapping
Amjad Hussain Zahid, Muhammad Junaid Arshad
https://doi.org/10.3390/sym11030437
Journal:
Symmetry
Volume 11, Issue 3 (2019), p. 437
Application Based Construction and Optimization of Substitution Boxes Over 2D Mixed Chaotic Maps
Khawaja Muhammad Ali, Majid Khan
https://doi.org/10.1007/s10773-019-04188-3
Journal:
International Journal of Theoretical Physics
Volume 58, Issue 9 (2019), p. 3091
Constructing keyed strong S-Box with higher nonlinearity based on 2D hyper chaotic map and algebraic operation
Yuanyuan Si, Hongjun Liu, Mengdi Zhao
https://doi.org/10.1016/j.vlsi.2022.10.011
Journal:
Integration
Volume 88 (2023), p. 269
Design of Nonlinear Components Over a Mordell Elliptic Curve on Galois Fields
Anwer Mustafa Hilal, Fahd N. Al-Wesabi, Mohammed Alamgeer, Manar Ahmed Hamza, Mohammad Mahzari, Murad A. Almekhlafi
https://doi.org/10.32604/cmc.2022.022224
Journal:
Computers, Materials & Continua
Volume 71, Issue 1 (2022), p. 1313
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Noor Afiza Ariffin Mohd, Aymen Yousef Ahmed Ashawesh
https://doi.org/10.1088/1742-6596/1793/1/012066
Journal:
Journal of Physics: Conference Series
Volume 1793, Issue 1 (2021), p. 012066
Enhancement of Non-Permutation Binomial Power Functions to Construct Cryptographically Strong S-Boxes
Herman Isa, Syed Alwee Aljunid Syed Junid, Muhammad Reza Z’aba, Rosdisham Endut, Syed Mohammad Ammar, Norshamsuri Ali
https://doi.org/10.3390/math11020446
Journal:
Mathematics
Volume 11, Issue 2 (2023), p. 446
FibGeoPresent: A Highly Secured and Geographic Coordinate System Based Authenticated Lightweight Block Cipher for Smart System
M. Girija, P. Manickam, M. Ramaswami
https://doi.org/10.1007/s11277-021-08783-8
Journal:
Wireless Personal Communications
Volume 127, Issue 3 (2022), p. 2211
Intelligent security algorithm for UNICODE data privacy and security in IOT
Balajee Maram, J. M. Gnanasekar, Gunasekaran Manogaran, M. Balaanand
https://doi.org/10.1007/s11761-018-0249-x
Journal:
Service Oriented Computing and Applications
Volume 13, Issue 1 (2019), p. 3
Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher
Hafeez ur Rehman, Tariq Shah, Mohammad Mazyad Hazzazi, Ali Alshehri, Bassfar Zaid
https://doi.org/10.32604/cmc.2022.028765
Journal:
Computers, Materials & Continua
Volume 73, Issue 2 (2022), p. 2913
New Key-Dependent S-Box Generation Algorithm on AES
Proteeti Das, Najmul Hoque Munshi, Subhasis Maitra
https://doi.org/10.2174/1876402913666210726163822
Journal:
Micro and Nanosystems
Volume 14, Issue 3 (2022), p. 263
Randomized Substitution Method for Effectively Secure Block Ciphers in I.O.T Environment
Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf, Muhammad Rehan Faheem
https://doi.org/10.1007/s13369-020-04919-3
Journal:
Arabian Journal for Science and Engineering
Volume 45, Issue 12 (2020), p. 11019
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top