Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map
暂无分享,去创建一个
Musheer Ahmad | Eesa A. Alsolami | Eesa A. Alsolami | Amer Awad Alzaidi | Hussam S. Ahmed | Musheer Ahmad | A. Alzaidi | M. Ahmad | Hussam S. Ahmed
[1] A.M. Youssef,et al. On some probabilistic approximations for AES-like s-boxes , 2006, Discret. Math..
[2] William Millan,et al. How to Improve the Nonlinearity of Bijective S-Boxes , 1998, ACISP.
[3] Selçuk Kavut,et al. Results on rotation-symmetric S-boxes , 2012, Inf. Sci..
[4] Ye Tian,et al. Chaotic S-Box: Intertwining Logistic Map and Bacterial Foraging Optimization , 2017 .
[5] Musheer Ahmad,et al. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map , 2018, Neural Computing and Applications.
[6] Tong Zhang,et al. Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators , 2018, IEEE Transactions on Cybernetics.
[7] Safya Belghith,et al. A novel method for designing S-box based on chaotic map and Teaching–Learning-Based Optimization , 2016, Nonlinear Dynamics.
[8] Yuliang Zheng,et al. GAC - the Criterion for Global Avalance Characteristics of Cryptographic Functions , 1995, J. Univers. Comput. Sci..
[9] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[10] M. Zarebnia,et al. A combination chaotic system and application in color image encryption , 2017, ArXiv.
[11] Tariq Shah,et al. A Watermarking Technique with Chaotic Fractional S-Box Transformation , 2016, Wirel. Pers. Commun..
[12] Yicong Zhou,et al. A new 1D chaotic system for image encryption , 2014, Signal Process..
[13] Zeeshan Asghar,et al. A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation , 2016, Neural Computing and Applications.
[14] Yang Li,et al. A novel method to design S-box based on chaotic map and genetic algorithm , 2012 .
[15] Gregory V. Bard,et al. Algebraic Cryptanalysis , 2009 .
[16] C. Adams. A formal and practical design procedure for substitution-permutation network cryptosystems , 1992 .
[17] H. Feistel. Cryptography and Computer Privacy , 1973 .
[18] Verónica Fernández Mármol,et al. On the inadequacy of the logistic map for cryptographic applications , 2008, 0805.4355.
[19] Lilian Huang,et al. A new color image encryption using combination of the 1D chaotic map , 2017, Signal Process..
[20] Wang Yong,et al. An Improved Method to Obtaining S-Box Based on Chaos and Genetic Algorithm , 2012 .
[21] Abdennaceur Kachouri,et al. A novel design of Chaos based S-Boxes using genetic algorithm techniques , 2014, 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA).
[22] Amir Akhavan,et al. Chaotic Cryptographic Scheme Based on Composition Maps , 2006, Int. J. Bifurc. Chaos.
[23] Musheer Ahmad,et al. A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes , 2018, Entropy.
[24] M. N. Vrahatis,et al. Utilizing Evolutionary Computation Methods for the Design of S-Boxes , 2006, 2006 International Conference on Computational Intelligence and Security.
[25] Nasir Siddiqui,et al. A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map , 2017, Secur. Commun. Networks.
[26] Tariq Shah,et al. Construction of S-box based on chaotic Boolean functions and its application in image encryption , 2015, Neural Computing and Applications.
[27] Seyedali Mirjalili,et al. SCA: A Sine Cosine Algorithm for solving optimization problems , 2016, Knowl. Based Syst..
[28] Tian Ye,et al. Chaotic S-box: six-dimensional fractional Lorenz–Duffing chaotic system and O-shaped path scrambling , 2018 .
[29] Stjepan Picek,et al. A New Cost Function for Evolution of S-Boxes , 2016, Evolutionary Computation.
[30] Tariq Shah,et al. A novel construction of substitution box using a combination of chaotic maps with improved chaotic range , 2017, Nonlinear Dynamics.
[31] Musheer Ahmad,et al. A Novel Ant Colony Optimization Based Scheme for Substitution Box Design , 2015 .
[32] Ye Tian,et al. S-box: six-dimensional compound hyperchaotic map and artificial bee colony algorithm , 2016 .
[33] Shouming Zhong,et al. A new 4D hyperchaotic system with high complexity , 2018, Math. Comput. Simul..
[34] Marjan Mernik,et al. Exploration and exploitation in evolutionary algorithms: A survey , 2013, CSUR.
[35] Musheer Ahmad,et al. ABC Optimization Based Construction of Strong Substitution-Boxes , 2018, Wirel. Pers. Commun..
[36] S M Pincus,et al. Approximate entropy as a measure of system complexity. , 1991, Proceedings of the National Academy of Sciences of the United States of America.
[37] Muhammad Asif,et al. A Method of Generating 8 × 8 Substitution Boxes Based on Elliptic Curves , 2018, Wireless Personal Communications.
[38] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[39] Guanrong Chen,et al. On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.
[40] Cunsheng Ding,et al. Nonlinearities of S-boxes , 2007, Finite Fields Their Appl..
[41] Musheer Ahmad,et al. Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos , 2017, ArXiv.
[42] Zeeshan Ahmed,et al. A Technique for Designing Substitution Box Based on Van der Pol Oscillator , 2015, Wirel. Pers. Commun..
[43] William Millan,et al. Multi-objective optimisation of bijective s-boxes , 2004, IEEE Congress on Evolutionary Computation.
[44] Dragan Lambić,et al. A novel method of S-box design based on discrete chaotic map , 2017 .
[45] Carlisle M. Adams,et al. The structured design of cryptographically good s-boxes , 1990, Journal of Cryptology.
[46] Paulo S. L. M. Barreto,et al. Rotation symmetry in algebraically generated cryptographic substitution tables , 2008, Inf. Process. Lett..
[47] P. Tesar. A New Method for Generating High Non-linearity S-Boxes , 2010 .
[48] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[49] Musheer Ahmad,et al. A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes , 2018, IEEE Access.
[50] Vincent Rijmen,et al. Algebraic Construction and Cryptographic Properties of Rijndael Substitution Box , 2012 .
[51] Cunsheng Ding,et al. The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.
[52] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[53] L. Burnett,et al. Heuristic Optimization of Boolean Functions andSubstitution Boxes for Cryptography , 2005 .