A method for generation of substitution box based on random selection
暂无分享,去创建一个
[1] Kaisa Nyberg,et al. Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.
[2] Musheer Ahmad,et al. Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures , 2020, IEEE Access.
[3] Kwok-Wo Wong,et al. On the Security of a Class of Diffusion Mechanisms for Image Encryption , 2015, IEEE Transactions on Cybernetics.
[4] Ingrid Verbauwhede,et al. Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms , 2007 .
[5] Chengqing Li,et al. When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..
[6] Nidaa A. Abbas,et al. Image encryption based on Independent Component Analysis and Arnold’s Cat Map , 2016 .
[7] Fatih Özkaynak,et al. Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique , 2019, IEEE Access.
[8] Fatih Özkaynak,et al. A Novel Method for Performance Improvement of Chaos-Based Substitution Boxes , 2020, Symmetry.
[9] Mobashar Rehman,et al. Generation of Highly Nonlinear and Dynamic AES Substitution-Boxes (S-Boxes) Using Chaos-Based Rotational Matrices , 2020, IEEE Access.
[10] Wei Feng,et al. Cryptanalysis and Improvement of the Hyper-Chaotic Image Encryption Scheme Based on DNA Encoding and Scrambling , 2018, IEEE Photonics Journal.
[11] Nasir Siddiqui,et al. A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field , 2020, PloS one.
[12] Fatih Özkaynak,et al. Side-Channel Analysis of Chaos-Based Substitution Box Structures , 2019, IEEE Access.
[13] S. Agaian,et al. NPCR and UACI Randomness Tests for Image Encryption , 2011 .
[14] Fatih Özkaynak,et al. Role of NPCR and UACI tests in security problems of chaos based image encryption algorithms and possible solution proposals , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).
[15] Fatih Özkaynak,et al. Construction of robust substitution boxes based on chaotic systems , 2019, Neural Computing and Applications.
[16] Jinhu Lu,et al. On Cryptanalysis of Fridrich's chaotic image encryption scheme , 2016, ArXiv.
[17] Wadii Boulila,et al. DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption , 2020, IEEE Access.
[18] Meng Ge,et al. A novel image encryption scheme based on 3D bit matrix and chaotic map with Markov properties , 2019, Egyptian Informatics Journal.
[19] Fatih Özkaynak. An Analysis and Generation Toolbox for Chaotic Substitution Boxes: A Case Study Based on Chaotic Labyrinth Rene Thomas System , 2020 .
[20] Joan Daemen,et al. The Design of Rijndael: The Advanced Encryption Standard (AES) , 2020, Information Security and Cryptography.
[21] Erkan Tanyildizi,et al. A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps , 2019, IEEE Access.
[22] Nasir Siddiqui,et al. A Novel Algebraic Technique for Design of Computational Substitution-Boxes Using Action of Matrices on Galois Field , 2020, IEEE Access.
[23] Tabasam Rashid,et al. Construction of Nonlinear Component of Block Cipher by Action of Modular Group PSL(2, Z) on Projective Line PL(GF(28)) , 2020, IEEE Access.
[24] Walaa M. Sheta,et al. Security-aware dynamic VM consolidation , 2020, Egyptian Informatics Journal.
[25] Ammar Odeh,et al. Security and privacy of electronic health records: Concerns and challenges , 2020, Egyptian Informatics Journal.
[26] Musheer Ahmad,et al. Evolving Dynamic S-Boxes Using Fractional-Order Hopfield Neural Network Based Scheme , 2020, Entropy.
[27] Fatih Özkaynak,et al. An Image Encryption Algorithm Based on Chaotic Selection of Robust Cryptographic Primitives , 2020, IEEE Access.
[28] Musheer Ahmad,et al. Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications , 2020, IEEE Access.
[29] Benfano Soewito,et al. IoT security system with modified Zero Knowledge Proof algorithm for authentication , 2020 .
[30] Farah R. Shareef. A novel crypto technique based ciphertext shifting , 2020 .
[31] Atta Ullah,et al. A Novel Group Theoretic and Graphical Approach for Designing Cryptographically Strong Nonlinear Components of Block Ciphers , 2020, Wireless Personal Communications.
[32] Fatih Özkaynak,et al. A Method to Determine the Most Suitable Initial Conditions of Chaotic Map in Statistical Randomness Applications , 2021, IEEE Access.
[33] Sodeif Ahadpour,et al. Execution examination of chaotic S-box dependent on improved PSO algorithm , 2020, Neural Computing and Applications.
[34] Matthew J. B. Robshaw,et al. The Block Cipher Companion , 2011, Information Security and Cryptography.