A new algorithm for the construction of substitution box by using chaotic map

[1]  Tariq Shah,et al.  A scheme based on algebraic and chaotic structures for the construction of substitution box , 2019, Multimedia Tools and Applications.

[2]  Tariq Shah,et al.  Construction of new substitution boxes using linear fractional transformation and enhanced chaos , 2019, Chinese Journal of Physics.

[3]  Yi-Ping Phoebe Chen,et al.  Designing secure substitution boxes based on permutation of symmetric group , 2019, Neural Computing and Applications.

[4]  Iqtadar Hussain,et al.  Construction of S-Box Based on Chaotic Map and Algebraic Structures , 2019, Symmetry.

[5]  Iqtadar Hussain,et al.  A Novel Method to Identify Initial Values of Chaotic Maps in Cybersecurity , 2019, Symmetry.

[6]  Iqtadar Hussain,et al.  A novel algorithm for thermal image encryption. , 2018, Journal of integrative neuroscience.

[7]  Arslan Shafique,et al.  Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps , 2018, The European Physical Journal Plus.

[8]  Aslam Muhammad,et al.  A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map , 2018, Secur. Commun. Networks.

[9]  Amir Anees,et al.  A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps , 2018, The European Physical Journal Plus.

[10]  Tariq Shah,et al.  A novel construction of substitution box using a combination of chaotic maps with improved chaotic range , 2017, Nonlinear Dynamics.

[11]  Dawei Wang,et al.  A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .

[12]  Kalyani Mali,et al.  A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map , 2016 .

[13]  Amir Anees,et al.  An Image Encryption Scheme Based on Lorenz System for Low Profile Applications , 2015 .

[14]  Yuling Luo,et al.  A perturbation method to the tent map based on Lyapunov exponent and its application , 2015 .

[15]  Zeeshan Ahmed,et al.  A Technique for Designing Substitution Box Based on Van der Pol Oscillator , 2015, Wirel. Pers. Commun..

[16]  Adil Masood Siddiqui,et al.  Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..

[17]  Mohammed Yakoob Siyal,et al.  A Noisy Channel Tolerant Image Encryption Scheme , 2014, Wireless Personal Communications.

[18]  M. I. Moussa,et al.  Image encryption based on new one-dimensional chaotic map , 2014, 2014 International Conference on Engineering and Technology (ICET).

[19]  Adil Masood Siddiqui,et al.  A technique for digital watermarking in combined spatial and transform domains using chaotic maps , 2013, 2013 2nd National Conference on Information Assurance (NCIA).

[20]  M. Gondal,et al.  Analysis of optimized signal processing algorithms for smart antenna system , 2013, Neural Computing and Applications.

[21]  Stefan Winkler,et al.  Analysis of Public Image and Video Databases for Quality Assessment , 2012, IEEE Journal of Selected Topics in Signal Processing.

[22]  Xingyuan Wang,et al.  Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .

[23]  Ibrahim Sogukpinar,et al.  Analysis and Comparison of Image Encryption Algorithms , 2007 .

[24]  Baodian Wei,et al.  An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[25]  A. Lloyd THE COUPLED LOGISTIC MAP : A SIMPLE MODEL FOR THE EFFECTS OF SPATIAL HETEROGENEITY ON POPULATION DYNAMICS , 1995 .

[26]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[27]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[28]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[29]  Iqtadar Hussain,et al.  Image encryption based on Chebyshev chaotic map and S8 S-boxes , 2019 .

[30]  Chuandong Li,et al.  A DNA-based security solution using aggregated chaos cross and cubic map , 2016, Int. Arab J. Inf. Technol..

[31]  Fawad Ahmed,et al.  Hash-Based Authentication of Digital Images in Noisy Channels , 2015 .

[32]  Iqtadar Hussain,et al.  Application of Mean of Absolute Deviation Method for the Selection of Best Nonlinear Component Based on Video Encryption , 2013 .

[33]  Yong Wang,et al.  Analyses of SKIPJACK S-Box , 2011 .

[34]  Tariq Shah,et al.  Statistical analysis of S-box in image encryption applications based on majority logic criterion , 2011 .

[35]  Eltayeb Salih Abuelyman,et al.  An Optimized Implementation of the S-Box using Residues of Prime Numbers , 2008 .

[36]  Ling-guo Cui,et al.  A NEW S-BOX STRUCTURE NAMED AFFINE-POWER-AFFINE , 2007 .