A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm

Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer resistance to cryptanalysis. The construction of strong S-boxes has gained considerable attention in the area of cryptography. In fact, the security o...

Full description

Saved in:
Bibliographic Details
Published inMultimedia tools and applications Vol. 80; no. 5; pp. 7333 - 7350
Main Authors Alhadawi, Hussam S., Majid, Mazlina Abdul, Lambić, Dragan, Ahmad, Musheer
Format Journal Article
LanguageEnglish
Published New York Springer US 01.02.2021
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer resistance to cryptanalysis. The construction of strong S-boxes has gained considerable attention in the area of cryptography. In fact, the security of transmitted data is highly dependent on the strength of the S-boxes for the prevention of unauthorised access. Therefore, the creation of strong S-box with high nonlinearity score has been considered a significant challenge. This study presented a novel method for the designing of 8 × 8 S-boxes with selected cryptographic characteristics based on a cuckoo search (CS) algorithm and discrete-space chaotic map. Notably, the advantage of the proposed approach is indicated through the efficient randomisation and lower adjustable parameters in CS compared to GA and PSO. Also, this approach utilised a 1D discrete-space chaotic map with virtually unlimited key space to design initial S-boxes, which is another advantage over the methods based on continuous-space chaotic maps, which consist of the limited key space. Moreover, chaotic maps have a potential to overcome the trapping problem of a standard CS in the local optima, and they were used to generate initial S-boxes to achieve the desired quality and facilitate the metaheuristic search. Accordingly, the metaheuristic CS was used to find a notable S-box configuration which fulfilled the established criteria. This objective was achieved by searching for the optimal or near-optimal features which maximised the given fitness function. The performance of the proposed method was evaluated based on the established performance evaluation criteria, including bijectivity, nonlinearity, strict avalanche criteria, bit independence criteria, differential uniformity, and linear probability. Based on the results of proposed method performance was benchmarked against the results of the recently developed S-boxes, it was indicated that the S-boxes exhibited good cryptographic features and could resist various cryptanalysis attacks.
AbstractList Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer resistance to cryptanalysis. The construction of strong S-boxes has gained considerable attention in the area of cryptography. In fact, the security of transmitted data is highly dependent on the strength of the S-boxes for the prevention of unauthorised access. Therefore, the creation of strong S-box with high nonlinearity score has been considered a significant challenge. This study presented a novel method for the designing of 8 × 8 S-boxes with selected cryptographic characteristics based on a cuckoo search (CS) algorithm and discrete-space chaotic map. Notably, the advantage of the proposed approach is indicated through the efficient randomisation and lower adjustable parameters in CS compared to GA and PSO. Also, this approach utilised a 1D discrete-space chaotic map with virtually unlimited key space to design initial S-boxes, which is another advantage over the methods based on continuous-space chaotic maps, which consist of the limited key space. Moreover, chaotic maps have a potential to overcome the trapping problem of a standard CS in the local optima, and they were used to generate initial S-boxes to achieve the desired quality and facilitate the metaheuristic search. Accordingly, the metaheuristic CS was used to find a notable S-box configuration which fulfilled the established criteria. This objective was achieved by searching for the optimal or near-optimal features which maximised the given fitness function. The performance of the proposed method was evaluated based on the established performance evaluation criteria, including bijectivity, nonlinearity, strict avalanche criteria, bit independence criteria, differential uniformity, and linear probability. Based on the results of proposed method performance was benchmarked against the results of the recently developed S-boxes, it was indicated that the S-boxes exhibited good cryptographic features and could resist various cryptanalysis attacks.
Author Alhadawi, Hussam S.
Majid, Mazlina Abdul
Ahmad, Musheer
Lambić, Dragan
Author_xml – sequence: 1
  givenname: Hussam S.
  orcidid: 0000-0003-2179-4383
  surname: Alhadawi
  fullname: Alhadawi, Hussam S.
  email: hussam.alhadawi@tdtu.edu.vn
  organization: Informetrics Research Group, Ton Duc Thang University, Faculty of Information Technology, Ton Duc Thang University
– sequence: 2
  givenname: Mazlina Abdul
  surname: Majid
  fullname: Majid, Mazlina Abdul
  organization: Faculty of Computer System and Software Engineering, University Malaysia Pahang
– sequence: 3
  givenname: Dragan
  surname: Lambić
  fullname: Lambić, Dragan
  organization: Faculty of Education, University of Novi Sad
– sequence: 4
  givenname: Musheer
  surname: Ahmad
  fullname: Ahmad, Musheer
  organization: Department of Computer Engineering
BookMark eNp9kE1LAzEQhoNUsH78AU8Bz9FJ9iPZoxS_oOBBPXgK2exsu7VNapKK_ntTKwgeespkeJ6Z4T0mI-cdEnLO4ZIDyKvIOZSCgQCW_6Vi6oCMeSULJqXgo1wXCpisgB-R4xgXALyuRDkmr9fU-Q9c0hWmue-o7-kTa_0n7TAOM0dbEzF3He2GaAMmpHZufBosXZl1pMZ11G7sm_c0ogl2Ts1y5sOQ5qtTctibZcSz3_eEvNzePE_u2fTx7mFyPWW2qGViWGNX2LZRpUTZAvRlxblURvGqa7kxiKAMF30DWG0ZxQ0IWwnZNKXgNRYn5GI3dx38-wZj0gu_CS6v1KJsMldCXWVK7SgbfIwBe22HZNLgXQpmWGoOehuk3gWpc5D6J0itsir-qeswrEz42i8VOylm2M0w_F21x_oGmluGfA
CitedBy_id crossref_primary_10_1007_s11760_024_03109_0
crossref_primary_10_1007_s40747_023_00988_7
crossref_primary_10_1109_ACCESS_2022_3218062
crossref_primary_10_1038_s41598_023_47607_6
crossref_primary_10_1140_epjs_s11734_022_00472_2
crossref_primary_10_1155_2021_9698371
crossref_primary_10_1007_s00521_021_06260_8
crossref_primary_10_3390_math10132172
crossref_primary_10_1007_s00521_022_07589_4
crossref_primary_10_1109_ACCESS_2024_3378731
crossref_primary_10_1016_j_eswa_2021_115305
crossref_primary_10_1016_j_eswa_2024_124904
crossref_primary_10_1109_ACCESS_2021_3086717
crossref_primary_10_1109_ACCESS_2022_3217211
crossref_primary_10_54365_adyumbd_1334213
crossref_primary_10_1007_s00500_024_09751_7
crossref_primary_10_2478_ias_2024_0018
crossref_primary_10_1007_s11042_024_19053_7
crossref_primary_10_1109_ACCESS_2023_3339389
crossref_primary_10_3390_pr10091675
crossref_primary_10_1007_s11071_024_10414_3
crossref_primary_10_1109_ACCESS_2023_3298111
crossref_primary_10_1016_j_chaos_2024_115952
crossref_primary_10_3390_s22145325
crossref_primary_10_1109_ACCESS_2021_3077194
crossref_primary_10_1016_j_csi_2024_103890
crossref_primary_10_3390_sym16080954
crossref_primary_10_1007_s11265_022_01744_9
crossref_primary_10_1109_ACCESS_2024_3410668
crossref_primary_10_1155_2022_1502988
crossref_primary_10_1016_j_vlsi_2023_05_006
crossref_primary_10_1109_ACCESS_2022_3151174
crossref_primary_10_1109_ACCESS_2023_3266290
crossref_primary_10_1007_s11760_023_02984_3
crossref_primary_10_32604_cmc_2023_041187
crossref_primary_10_1109_ACCESS_2023_3346319
crossref_primary_10_1007_s11042_023_14910_3
crossref_primary_10_1016_j_ins_2021_07_036
crossref_primary_10_1088_1402_4896_ad8a9c
crossref_primary_10_1109_ACCESS_2023_3313180
crossref_primary_10_3389_fphy_2022_902500
crossref_primary_10_1007_s10470_022_02061_8
crossref_primary_10_3934_era_2023137
crossref_primary_10_1088_1402_4896_ac59fa
crossref_primary_10_1007_s00500_024_09912_8
crossref_primary_10_1007_s13198_022_01766_3
crossref_primary_10_1007_s11042_023_15240_0
crossref_primary_10_1109_ACCESS_2022_3218643
crossref_primary_10_1016_j_icte_2022_11_005
crossref_primary_10_1007_s13369_021_05666_9
crossref_primary_10_32604_cmc_2023_037516
crossref_primary_10_1007_s11042_023_14394_1
crossref_primary_10_1109_ACCESS_2022_3209202
crossref_primary_10_1007_s13369_023_07715_x
crossref_primary_10_1016_j_matcom_2023_04_020
crossref_primary_10_3390_app14209572
crossref_primary_10_1016_j_heliyon_2023_e15902
crossref_primary_10_1109_ACCESS_2021_3090163
crossref_primary_10_1142_S0218127422501632
crossref_primary_10_1007_s00521_023_08243_3
crossref_primary_10_32604_jihpp_2024_058954
crossref_primary_10_1109_ACCESS_2021_3095618
crossref_primary_10_1155_2022_8338508
crossref_primary_10_1007_s11042_023_17046_6
crossref_primary_10_1007_s10489_022_03174_3
crossref_primary_10_1007_s11042_021_11635_z
crossref_primary_10_1007_s11042_021_10587_8
crossref_primary_10_1109_ACCESS_2021_3087139
crossref_primary_10_1007_s11277_021_08981_4
crossref_primary_10_1007_s11042_023_17200_0
crossref_primary_10_1007_s11042_023_17720_9
crossref_primary_10_1016_j_knosys_2025_112968
crossref_primary_10_1007_s11042_023_17763_y
crossref_primary_10_35193_bseufbd_1323521
crossref_primary_10_3934_math_20241681
crossref_primary_10_3934_math_2024303
crossref_primary_10_7717_peerj_cs_940
crossref_primary_10_1007_s11042_022_13612_6
crossref_primary_10_3390_sym16081070
crossref_primary_10_1007_s11277_023_10456_7
crossref_primary_10_1007_s00521_023_09095_7
crossref_primary_10_3390_math11102322
crossref_primary_10_1155_2022_2532497
crossref_primary_10_1007_s00521_022_07899_7
crossref_primary_10_1109_ACCESS_2021_3113338
crossref_primary_10_1007_s11042_023_15965_y
crossref_primary_10_1109_ACCESS_2021_3093247
crossref_primary_10_1007_s11277_024_11104_4
crossref_primary_10_1109_ACCESS_2022_3184012
Cites_doi 10.1007/BF00630563
10.1016/j.physa.2014.06.020
10.1007/s13319-017-0119-x
10.1016/j.chaos.2006.08.003
10.1007/978-3-319-03753-0_47
10.1007/3-540-48285-7_33
10.1007/s00521-018-3557-3
10.1016/j.chaos.2013.07.013
10.1007/s11071-016-3199-x
10.1016/j.apm.2015.10.052
10.1109/IC3.2015.7346660
10.1007/s00521-016-2511-5
10.1016/j.chaos.2013.11.001
10.1007/s11071-015-2283-y
10.1109/SOCPAR.2015.7492812
10.1007/11596219_5
10.1016/j.asoc.2017.02.034
10.1007/978-3-642-29694-9_17
10.1016/j.sigpro.2016.03.021
10.1007/s11071-013-0987-4
10.1016/j.jcp.2007.06.008
10.1007/s11071-013-0904-x
10.1109/IWCMC.2015.7289152
10.1007/s00521-013-1402-2
10.1109/ACCESS.2018.2871557
10.1007/s11071-012-0573-1
10.1016/j.chaos.2004.04.023
10.1007/s12095-015-0170-5
10.1109/ISCAS.2013.6571881
10.1109/ECBI.2009.15
10.1007/s11760-016-1007-1
10.1023/A:1019991004496
10.1109/IIHMSP.2011.67
10.1007/s11071-016-3295-y
10.1080/01611194.2018.1548390
10.1016/j.ijleo.2016.11.152
10.1109/NABIC.2009.5393690
10.1007/3-540-46416-6_30
10.1109/ICATCCT.2016.7912073
10.1093/oso/9780198502135.003.0003
10.1007/s11071-016-3046-0
10.1016/j.chaos.2015.08.001
10.1016/j.physleta.2010.07.019
10.1049/ip-e.1988.0044
10.1109/ICUFN.2017.7993947
10.1007/s11071-012-0621-x
10.1007/s11760-013-0577-4
10.1007/978-981-10-5687-1_75
10.1371/journal.pone.0000354
10.1016/j.cie.2013.08.003
10.1002/j.1538-7305.1949.tb00928.x
10.1016/j.procs.2015.07.394
10.1007/s11071-016-3099-0
10.1090/psapm/010/0113289
10.1007/s00521-017-3287-y
10.1007/3-540-39799-X_41
10.3390/e21030245
10.1109/81.904880
10.3390/e20070525
10.1007/978-3-540-85912-3_31
10.1007/978-3-319-10762-2_81
10.1016/j.physleta.2012.01.009
10.1007/s10745-006-9083-4
10.1038/443281a
10.1109/TCYB.2018.2846186
10.1007/s00521-015-1887-y
10.1038/nature06948
10.1007/s11277-016-3436-0
10.1007/s11760-013-0570-y
10.1007/s00500-015-1726-1
10.1007/s11042-012-1173-2
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2020
Springer Science+Business Media, LLC, part of Springer Nature 2020.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020
– notice: Springer Science+Business Media, LLC, part of Springer Nature 2020.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
Q9U
DOI 10.1007/s11042-020-10048-8
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Global (Alumni Edition)
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
Research Library (Alumni)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
ProQuest Research Library
ProQuest SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Research Library
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList ABI/INFORM Global (Corporate)

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 7350
ExternalDocumentID 10_1007_s11042_020_10048_8
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFO
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACREN
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ACMFV
ACSTC
ADHKG
ADKFA
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
7SC
7XB
8AL
8FD
8FK
ABRTQ
JQ2
L.-
L7M
L~C
L~D
MBDVC
PKEHL
PQEST
PQGLB
PQUKI
Q9U
ID FETCH-LOGICAL-c367t-e6ed3cb9847e7b00f451178a815db1aaee08a12f90e5847e81a02c527994216e3
IEDL.DBID BENPR
ISSN 1380-7501
IngestDate Sat Jul 26 00:02:35 EDT 2025
Tue Jul 01 04:13:07 EDT 2025
Thu Apr 24 22:54:54 EDT 2025
Fri Feb 21 02:49:38 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Keywords Chaos
CS optimization
Cryptography
S-boxes
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c367t-e6ed3cb9847e7b00f451178a815db1aaee08a12f90e5847e81a02c527994216e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-2179-4383
PQID 2492794065
PQPubID 54626
PageCount 18
ParticipantIDs proquest_journals_2492794065
crossref_citationtrail_10_1007_s11042_020_10048_8
crossref_primary_10_1007_s11042_020_10048_8
springer_journals_10_1007_s11042_020_10048_8
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-02-01
PublicationDateYYYYMMDD 2021-02-01
PublicationDate_xml – month: 02
  year: 2021
  text: 2021-02-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2021
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Rodrigues D, Pereira LA, Almeida T, Papa JP, Souza A, Ramos CC, Yang X-S BCS (2013) A binary cuckoo search algorithm for feature selection. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on. IEEE, pp 465–468
ZaghloulAZhangTHouHAminMEl-LatifAAAEl-WahabMSAA block encryption scheme for secure still visual data based on one-way coupled map latticeInt J Sec Appl20148489100
LambićDA novel method of S-box design based on chaotic map and composition methodChaos, Solitons Fractals20145816211348.94064
MurphySRobshawMJBKey-dependent S-boxes and differential cryptanalysisDes Codes Crypt200227322925519284401022.94011
TangGLiaoXChenYA novel method for designing S-boxes based on chaotic mapsChaos, Solitons Fractals20052324134191068.94017
BelaziAEl-LatifAAABelghithSA novel image encryption scheme based on substitution-permutation network and chaosSignal Process2016128155170
TianYLuZS-box: six-dimensional compound hyperchaotic map and artificial bee colony algorithmJ Syst Eng Electron2016271232241
El-LatifAAALiLNiuXA new image encryption scheme based on cyclic elliptic curve and chaotic systemMultimed Tools Appl201470315591584
KhanMShahTAn efficient construction of substitution box with fractional chaotic systemSIViP201596133513383351826
AlzaidiAAAhmadMDojaMNAl SolamiEBegMSA new 1D chaotic map and $\beta $-hill climbing for generating substitution-boxesIEEE Access201865540555418
El-LatifAAALiLWangNPengJ-LShiZ-FNiuXA new image encryption scheme for secure digital images based on combination of polynomial chaotic mapsRes J Appl Sci Eng Technol201244322328
Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. Int Conf Elect Comm Bus Intel 125–128
ShannonCECommunication theory of secrecy systemsBell Labs Tech J1949284656715321331200.94005
AhmadMBhatiaDHassanYA novel ant colony optimization based scheme for substitution box designProc Comput Sci201557572580
Manjula G, Mohan H (2016) Constructing key dependent dynamic S-Box for AES block cipher system. In: 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, pp 613–617
Webster A, Tavares SE (1985) On the design of S-boxes. Conf Theory Appl Cryptograph Tech:523–534
KazakevičiusRRuseckasJLévy flights in inhomogeneous environments and 1/f noisePhys A: Stat Mech Appl2014411951031395.82190
KanagarajGPonnambalamSJawaharNA hybrid cuckoo search and genetic algorithm for reliability–redundancy allocation problemsComput Ind Eng201366411151124
AlhadawiHSZolkipliMFIsmailSMLambićDDesigning a pseudorandom bit generator based on LFSRs and a discrete chaotic mapCryptologia2019433190211
Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press
Ahmad M, Ahmad F, Nasim Z, Bano Z, Zafar S (2015) Designing chaos based strong substitution box. Paper presented at the eighth international conference on contemporary computing (IC3) (2015)
Yang X-S (2013) Bat algorithm and cuckoo search: a tutorial. In: Artificial Intelligence, Evolutionary Computing and Metaheuristics. Springer, pp. 421–434
Payne RB, Sorensen MD (2005) The cuckoos, vol 15. Oxford University Press
Peng J, El-Latif AAA, Belazi A, Kotulski Z (2017) Efficient chaotic nonlinear component for secure cryptosystems. In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, pp 989–993
LambićDA novel method of S-box design based on discrete chaotic mapNonlinear Dyn2017874240724133608831
AhmedHAZolkipliMFAhmadMA novel efficient substitution-box design based on firefly algorithm and discrete chaotic mapNeural Comput & Applic2018317201721010.1007/s00521-018-3557-3
KhanMShahTMahmoodHGondalMAHussainIA novel technique for the construction of strong S-boxes based on chaotic Lorenz systemsNonlinear Dyn2012703230323112992216
Picek S, Marchiori E, Batina L, Jakobovic D (2014) Combining evolutionary computation and algebraic constructions to find cryptography-relevant Boolean functions. In: International Conference on Parallel Problem Solving from Nature. Springer, pp 822–831
TianYLuZChaotic S-box: intertwining logistic map and bacterial foraging optimizationMath Probl Eng2017201711137297191426.94127
WangYWongK-WLiCLiYA novel method to design S-box based on chaotic map and genetic algorithmPhys Lett A201237668278331255.81165
OuaarabAAhiodBYangX-SDiscrete cuckoo search algorithm for the travelling salesman problemNeural Comput & Applic2014247–816591669
Özkaynak F (2017) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 1–10
BihamEShamirADifferential cryptanalysis of DES-like cryptosystemsJ Cryptol19914137212027860729.68017
LambićDA new discrete chaotic map based on the composition of permutationsChaos, Solitons Fractals20157824524833942441353.37031
Carlet C (2005) On highly nonlinear S-boxes and their inability to thwart DPA attacks. In: INDOCRYPT. Springer, pp 49–62
ShehabMKhaderATAl-BetarMAA survey on applications and variants of the cuckoo search algorithmAppl Soft Comput20176110411059
ÖzkaynakFÇelikVÖzerABA new S-box construction method based on the fractional-order chaotic Chen systemSIViP2017114659664
LehmerDHTeaching combinatorial tricks to a computerProc Sympos Appl Math Combinatorial Anal1960101791931132890096.00504
ShlesingerMFMathematical physics: search researchNature20064437109281282
IvanovGNikolovNNikovaSReversed genetic algorithms for generation of bijective s-boxes with good cryptographic propertiesCryptogr Commun20168224727634882191338.94074
ÖzkaynakFÖzerABA method for designing strong S-boxes based on chaotic Lorenz systemPhys Lett A201037436373337381238.34085
PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E-Comput Digit Tech19881356325335
Matsui M (1993) Linear cryptanalysis method for DES cipher. Workshop Theory Appl Cryptograph Techn 386–397
CuiLCaoYA new S-box structure named affine-power-affineInt J Innov Comput, Inform Control200733751759
BenrhoumaOHermassiHEl-LatifAAABelghithSCryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domainSIViP20159612811286
ZahidAHArshadMJAhmadMA novel construction of efficient substitution-boxes using cubic fractional transformationEntropy20192132453943228
Dawson M, Tavares SE (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Workshop Theory Appl Cryptograph Techn 352–367
PavlyukevichILévy flights, non-local search and simulated annealingJ Comput Phys200722621830184423563961125.65009
ChenGA novel heuristic method for obtaining S-boxesChaos, Solitons Fractals20083641028103623793681131.94012
JamalSSKhanMUShahTA watermarking technique with chaotic fractional S-box transformationWirel Pers Commun201690420332049
ZhangTEl-FatyanyALiLAminMEl-LatifAAASecret sharing-based chaotic image encryptionInt J Sec Appl201597217224
BrownCTLiebovitchLSGlendonRLévy flights in Dobe Ju/‘hoansi foraging patternsHum Ecol2007351129138
Yang X-S, Deb S (2009) Cuckoo search via Lévy flights. In: Nature & Biologically Inspired Computing. NaBIC 2009. World congress on, 2009. IEEE, pp 210–214
FarahTRhoumaRBelghithSA novel method for designing S-box based on chaotic map and teaching–learning-based optimizationNonlinear Dyn201788210591074
WangG-GDebSGandomiAHZhangZAlaviAHChaotic cuckoo searchSoft Comput201620933493362
El-Latif AAA, Li L, Wang N, Li Q, Niu X A (2012) new image encryption based on chaotic systems and singular value decomposition. In: Fourth International Conference on Digital Image Processing (ICDIP 2012). International Society for Optics and Photonics, p 83343F
Mohamed NA, El-Azeim MA, Zaghloul A, El-Latif AAA (2015) Image encryption scheme for secure digital images based on 3D cat map and turing machine. In: 2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR). IEEE, pp 230–234
BaronchelliARadicchiFLévy flights in human behavior and cognitionChaos, Solitons Fractals201356101105
JakimoskiGKocarevLChaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Trans Circ Syst I: Fund Theory Appl200148216316918205410998.94016
KhanMShahTGondalMAAn efficient technique for the construction of substitution box with chaotic partial differential equationNonlinear Dyn2013733179518013083821
ÖzkaynakFYavuzSDesigning chaotic S-boxes based on time-delay chaotic systemNonlinear Dyn201374355155731176411344.94069
ÇavuşoğluÜZenginAPehlivanIKaçarSA novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang systemNonlinear Dyn2017872108110941373.68212
Ahmad M, Seeru F, Siddiqi AM, Masood S (2018) Dynamic 9× 9 substitution-boxes using Chaos-based heuristic search. In: soft computing: theories and applications. Springer, pp 839-851
ReynoldsAMFryeMAFree-flight odor tracking in Drosophila is consistent with an optimal intermittent scale-free searchPLoS One200724
Carlet C (2008) On the higher order nonlinearities of Boolean functions and S-boxes, and their generalizations. In: International Conference on Sequences and Their Applications. Springer, pp 345–367
BelaziAKhanMEl-LatifAAABelghithSEfficient cryptosystem approaches: S-boxes and permutation–substitution-based encryptionNonlinear Dyn2017871337361
El-Latif AAA, Li L, Wang N, Niu X (2011) Image encryption scheme of pixel bit based on combination of chaotic systems. In: 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, pp 369–373
Al SolamiEAhmadMVolosCDojaMBegMA new hyperchaotic system-based design for efficient bijective substitution-boxesEntropy2018207525
KhanMAsgharZA novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutationNeural Comput & Applic2018294993999
Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media
Belazi A, El-Latif AAA, Rhouma R, Belghith S (2015) Selective image encryption scheme based on DWT, AES S-box and chaotic
J Pieprzyk (10048_CR62) 1988; 135
M Ahmad (10048_CR2) 2015; 57
G Jakimoski (10048_CR33) 2001; 48
MF Shlesinger (10048_CR67) 2006; 443
SS Jamal (10048_CR34) 2016; 90
AA Alzaidi (10048_CR7) 2018; 6
S Murphy (10048_CR52) 2002; 27
10048_CR77
10048_CR76
AAA El-Latif (10048_CR25) 2012; 4
10048_CR72
10048_CR75
10048_CR30
A Belazi (10048_CR13) 2017; 87
Ü Çavuşoğlu (10048_CR19) 2017; 87
G Ivanov (10048_CR32) 2016; 8
Y Tian (10048_CR70) 2017; 2017
M Khan (10048_CR39) 2012; 70
CE Shannon (10048_CR65) 1949; 28
M Khan (10048_CR41) 2016; 27
D Lambić (10048_CR42) 2014; 58
Y Wang (10048_CR73) 2012; 376
Y Tian (10048_CR69) 2016; 27
HA Ahmed (10048_CR4) 2018; 31
O Benrhouma (10048_CR14) 2015; 9
P Barthelemy (10048_CR9) 2008; 453
10048_CR48
10048_CR47
M Khan (10048_CR37) 2018; 29
10048_CR49
E Al Solami (10048_CR5) 2018; 20
DH Lehmer (10048_CR45) 1960; 10
G Chen (10048_CR20) 2008; 36
A Belazi (10048_CR12) 2016; 128
F Özkaynak (10048_CR55) 2010; 374
L Cui (10048_CR21) 2007; 3
A Ouaarab (10048_CR53) 2014; 24
X-S Yang (10048_CR78) 2010; 1
E Biham (10048_CR15) 1991; 4
M Khan (10048_CR38) 2015; 9
F ul Islam (10048_CR71) 2017; 8
10048_CR11
T Farah (10048_CR28) 2017; 88
AAA El-Latif (10048_CR27) 2014; 70
10048_CR54
M Khan (10048_CR40) 2013; 73
10048_CR59
M Shehab (10048_CR66) 2017; 61
10048_CR17
L Huang (10048_CR29) 2016; 40
A Zaghloul (10048_CR79) 2014; 8
D Lambić (10048_CR43) 2015; 78
F Özkaynak (10048_CR56) 2013; 74
G Tang (10048_CR68) 2005; 23
T Zhang (10048_CR82) 2018; 48
10048_CR51
10048_CR50
10048_CR3
10048_CR1
F Özkaynak (10048_CR57) 2017; 11
G-G Wang (10048_CR74) 2016; 20
AH Zahid (10048_CR80) 2019; 21
HS Alhadawi (10048_CR6) 2019; 43
T Zhang (10048_CR81) 2015; 9
10048_CR18
G Kanagaraj (10048_CR35) 2013; 66
A Belazi (10048_CR10) 2017; 130
G Liu (10048_CR46) 2015; 82
I Hussain (10048_CR31) 2012; 70
10048_CR22
I Pavlyukevich (10048_CR58) 2007; 226
10048_CR24
AM Reynolds (10048_CR63) 2007; 2
10048_CR23
10048_CR26
D Lambić (10048_CR44) 2017; 87
10048_CR60
A Baronchelli (10048_CR8) 2013; 56
10048_CR61
10048_CR64
CT Brown (10048_CR16) 2007; 35
R Kazakevičius (10048_CR36) 2014; 411
References_xml – reference: Mohamed NA, El-Azeim MA, Zaghloul A, El-Latif AAA (2015) Image encryption scheme for secure digital images based on 3D cat map and turing machine. In: 2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR). IEEE, pp 230–234
– reference: HussainIShahTGondalMAA novel approach for designing substitution-boxes based on nonlinear chaotic algorithmNonlinear Dyn2012703179117942992175
– reference: ZaghloulAZhangTHouHAminMEl-LatifAAAEl-WahabMSAA block encryption scheme for secure still visual data based on one-way coupled map latticeInt J Sec Appl20148489100
– reference: Manjula G, Mohan H (2016) Constructing key dependent dynamic S-Box for AES block cipher system. In: 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, pp 613–617
– reference: Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media
– reference: Al SolamiEAhmadMVolosCDojaMBegMA new hyperchaotic system-based design for efficient bijective substitution-boxesEntropy2018207525
– reference: BarthelemyPBertolottiJWiersmaDSA Lévy flight for lightNature20084537194495498
– reference: El-Latif AAA, Li L, Wang N, Li Q, Niu X A (2012) new image encryption based on chaotic systems and singular value decomposition. In: Fourth International Conference on Digital Image Processing (ICDIP 2012). International Society for Optics and Photonics, p 83343F
– reference: Webster A, Tavares SE (1985) On the design of S-boxes. Conf Theory Appl Cryptograph Tech:523–534
– reference: OuaarabAAhiodBYangX-SDiscrete cuckoo search algorithm for the travelling salesman problemNeural Comput & Applic2014247–816591669
– reference: Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press
– reference: ul IslamFLiuGDesigning S-Box Based on 4D-4Wing Hyperchaotic System3D Res2017819
– reference: Carlet C (2005) On highly nonlinear S-boxes and their inability to thwart DPA attacks. In: INDOCRYPT. Springer, pp 49–62
– reference: El-LatifAAALiLNiuXA new image encryption scheme based on cyclic elliptic curve and chaotic systemMultimed Tools Appl201470315591584
– reference: Belazi A, El-Latif AAA, Rhouma R, Belghith S (2015) Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, pp 606–610
– reference: Yang X-S, Deb S (2009) Cuckoo search via Lévy flights. In: Nature & Biologically Inspired Computing. NaBIC 2009. World congress on, 2009. IEEE, pp 210–214
– reference: Ahmad M, Ahmad F, Nasim Z, Bano Z, Zafar S (2015) Designing chaos based strong substitution box. Paper presented at the eighth international conference on contemporary computing (IC3) (2015)
– reference: ZhangTChenCPChenLXuXHuBDesign of highly nonlinear substitution boxes based on I-Ching operatorsIEEE Trans Cybernet2018481233493358
– reference: KhanMShahTMahmoodHGondalMAHussainIA novel technique for the construction of strong S-boxes based on chaotic Lorenz systemsNonlinear Dyn2012703230323112992216
– reference: KhanMShahTAn efficient construction of substitution box with fractional chaotic systemSIViP201596133513383351826
– reference: BenrhoumaOHermassiHEl-LatifAAABelghithSCryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domainSIViP20159612811286
– reference: TianYLuZS-box: six-dimensional compound hyperchaotic map and artificial bee colony algorithmJ Syst Eng Electron2016271232241
– reference: Carlet C (2008) On the higher order nonlinearities of Boolean functions and S-boxes, and their generalizations. In: International Conference on Sequences and Their Applications. Springer, pp 345–367
– reference: ChenGA novel heuristic method for obtaining S-boxesChaos, Solitons Fractals20083641028103623793681131.94012
– reference: ReynoldsAMFryeMAFree-flight odor tracking in Drosophila is consistent with an optimal intermittent scale-free searchPLoS One200724
– reference: IvanovGNikolovNNikovaSReversed genetic algorithms for generation of bijective s-boxes with good cryptographic propertiesCryptogr Commun20168224727634882191338.94074
– reference: WangYWongK-WLiCLiYA novel method to design S-box based on chaotic map and genetic algorithmPhys Lett A201237668278331255.81165
– reference: ShannonCECommunication theory of secrecy systemsBell Labs Tech J1949284656715321331200.94005
– reference: Matsui M (1993) Linear cryptanalysis method for DES cipher. Workshop Theory Appl Cryptograph Techn 386–397
– reference: BihamEShamirADifferential cryptanalysis of DES-like cryptosystemsJ Cryptol19914137212027860729.68017
– reference: PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E-Comput Digit Tech19881356325335
– reference: CuiLCaoYA new S-box structure named affine-power-affineInt J Innov Comput, Inform Control200733751759
– reference: MurphySRobshawMJBKey-dependent S-boxes and differential cryptanalysisDes Codes Crypt200227322925519284401022.94011
– reference: Peng J, El-Latif AAA, Belazi A, Kotulski Z (2017) Efficient chaotic nonlinear component for secure cryptosystems. In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, pp 989–993
– reference: KhanMAsgharZA novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutationNeural Comput & Applic2018294993999
– reference: Ahmad M, Seeru F, Siddiqi AM, Masood S (2018) Dynamic 9× 9 substitution-boxes using Chaos-based heuristic search. In: soft computing: theories and applications. Springer, pp 839-851
– reference: ZhangTEl-FatyanyALiLAminMEl-LatifAAASecret sharing-based chaotic image encryptionInt J Sec Appl201597217224
– reference: ÖzkaynakFÖzerABA method for designing strong S-boxes based on chaotic Lorenz systemPhys Lett A201037436373337381238.34085
– reference: HuangLDingSYuSWangJLuKChaos-enhanced cuckoo search optimization algorithms for global optimizationAppl Math Model2016405–638603875346122707159597
– reference: YangX-SDebSEngineering optimisation by cuckoo searchInt J Math Model Num Optim2010143303431279.90204
– reference: TangGLiaoXChenYA novel method for designing S-boxes based on chaotic mapsChaos, Solitons Fractals20052324134191068.94017
– reference: KhanMShahTGondalMAAn efficient technique for the construction of substitution box with chaotic partial differential equationNonlinear Dyn2013733179518013083821
– reference: AhmadMBhatiaDHassanYA novel ant colony optimization based scheme for substitution box designProc Comput Sci201557572580
– reference: Mohanty PK, Parhi DR (2013) Cuckoo search algorithm for the mobile robot navigation. In: International Conference on Swarm, Evolutionary, and Memetic Computing. Springer, pp 527–536
– reference: ÇavuşoğluÜZenginAPehlivanIKaçarSA novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang systemNonlinear Dyn2017872108110941373.68212
– reference: El-LatifAAALiLWangNPengJ-LShiZ-FNiuXA new image encryption scheme for secure digital images based on combination of polynomial chaotic mapsRes J Appl Sci Eng Technol201244322328
– reference: LambićDA new discrete chaotic map based on the composition of permutationsChaos, Solitons Fractals20157824524833942441353.37031
– reference: LambićDA novel method of S-box design based on discrete chaotic mapNonlinear Dyn2017874240724133608831
– reference: Rodrigues D, Pereira LA, Almeida T, Papa JP, Souza A, Ramos CC, Yang X-S BCS (2013) A binary cuckoo search algorithm for feature selection. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on. IEEE, pp 465–468
– reference: Hussain I, Shah T, Gondal MA (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dynamics: 1–4
– reference: JamalSSKhanMUShahTA watermarking technique with chaotic fractional S-box transformationWirel Pers Commun201690420332049
– reference: Payne RB, Sorensen MD (2005) The cuckoos, vol 15. Oxford University Press,
– reference: BaronchelliARadicchiFLévy flights in human behavior and cognitionChaos, Solitons Fractals201356101105
– reference: KanagarajGPonnambalamSJawaharNA hybrid cuckoo search and genetic algorithm for reliability–redundancy allocation problemsComput Ind Eng201366411151124
– reference: KazakevičiusRRuseckasJLévy flights in inhomogeneous environments and 1/f noisePhys A: Stat Mech Appl2014411951031395.82190
– reference: LambićDA novel method of S-box design based on chaotic map and composition methodChaos, Solitons Fractals20145816211348.94064
– reference: ShehabMKhaderATAl-BetarMAA survey on applications and variants of the cuckoo search algorithmAppl Soft Comput20176110411059
– reference: AlhadawiHSZolkipliMFIsmailSMLambićDDesigning a pseudorandom bit generator based on LFSRs and a discrete chaotic mapCryptologia2019433190211
– reference: PavlyukevichILévy flights, non-local search and simulated annealingJ Comput Phys200722621830184423563961125.65009
– reference: ÖzkaynakFÇelikVÖzerABA new S-box construction method based on the fractional-order chaotic Chen systemSIViP2017114659664
– reference: TianYLuZChaotic S-box: intertwining logistic map and bacterial foraging optimizationMath Probl Eng2017201711137297191426.94127
– reference: BelaziAKhanMEl-LatifAAABelghithSEfficient cryptosystem approaches: S-boxes and permutation–substitution-based encryptionNonlinear Dyn2017871337361
– reference: BelaziAEl-LatifAAABelghithSA novel image encryption scheme based on substitution-permutation network and chaosSignal Process2016128155170
– reference: Dawson M, Tavares SE (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Workshop Theory Appl Cryptograph Techn 352–367
– reference: El-Latif AAA, Li L, Wang N, Niu X (2011) Image encryption scheme of pixel bit based on combination of chaotic systems. In: 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, pp 369–373
– reference: FarahTRhoumaRBelghithSA novel method for designing S-box based on chaotic map and teaching–learning-based optimizationNonlinear Dyn201788210591074
– reference: ÖzkaynakFYavuzSDesigning chaotic S-boxes based on time-delay chaotic systemNonlinear Dyn201374355155731176411344.94069
– reference: WangG-GDebSGandomiAHZhangZAlaviAHChaotic cuckoo searchSoft Comput201620933493362
– reference: AlzaidiAAAhmadMDojaMNAl SolamiEBegMSA new 1D chaotic map and $\beta $-hill climbing for generating substitution-boxesIEEE Access201865540555418
– reference: KhanMShahTBatoolSIConstruction of S-box based on chaotic Boolean functions and its application in image encryptionNeural Comput & Applic2016273677685
– reference: Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. Int Conf Elect Comm Bus Intel 125–128
– reference: ZahidAHArshadMJAhmadMA novel construction of efficient substitution-boxes using cubic fractional transformationEntropy20192132453943228
– reference: AhmedHAZolkipliMFAhmadMA novel efficient substitution-box design based on firefly algorithm and discrete chaotic mapNeural Comput & Applic2018317201721010.1007/s00521-018-3557-3
– reference: LehmerDHTeaching combinatorial tricks to a computerProc Sympos Appl Math Combinatorial Anal1960101791931132890096.00504
– reference: ShlesingerMFMathematical physics: search researchNature20064437109281282
– reference: BrownCTLiebovitchLSGlendonRLévy flights in Dobe Ju/‘hoansi foraging patternsHum Ecol2007351129138
– reference: Yang X-S (2013) Bat algorithm and cuckoo search: a tutorial. In: Artificial Intelligence, Evolutionary Computing and Metaheuristics. Springer, pp. 421–434
– reference: BelaziAEl-LatifAAAA simple yet efficient S-box method based on chaotic sine mapOptik201713014381444
– reference: LiuGYangWLiuWDaiYDesigning S-boxes based on 3-D four-wing autonomous chaotic systemNonlinear Dyn20158241867187734229861441.94086
– reference: Özkaynak F (2017) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 1–10
– reference: JakimoskiGKocarevLChaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Trans Circ Syst I: Fund Theory Appl200148216316918205410998.94016
– reference: Picek S, Marchiori E, Batina L, Jakobovic D (2014) Combining evolutionary computation and algebraic constructions to find cryptography-relevant Boolean functions. In: International Conference on Parallel Problem Solving from Nature. Springer, pp 822–831
– volume: 4
  start-page: 3
  issue: 1
  year: 1991
  ident: 10048_CR15
  publication-title: J Cryptol
  doi: 10.1007/BF00630563
– volume: 411
  start-page: 95
  year: 2014
  ident: 10048_CR36
  publication-title: Phys A: Stat Mech Appl
  doi: 10.1016/j.physa.2014.06.020
– volume: 8
  start-page: 9
  issue: 1
  year: 2017
  ident: 10048_CR71
  publication-title: 3D Res
  doi: 10.1007/s13319-017-0119-x
– volume: 36
  start-page: 1028
  issue: 4
  year: 2008
  ident: 10048_CR20
  publication-title: Chaos, Solitons Fractals
  doi: 10.1016/j.chaos.2006.08.003
– volume: 2017
  start-page: 1
  year: 2017
  ident: 10048_CR70
  publication-title: Math Probl Eng
– ident: 10048_CR51
  doi: 10.1007/978-3-319-03753-0_47
– ident: 10048_CR22
– ident: 10048_CR48
  doi: 10.1007/3-540-48285-7_33
– volume: 31
  start-page: 7201
  year: 2018
  ident: 10048_CR4
  publication-title: Neural Comput & Applic
  doi: 10.1007/s00521-018-3557-3
– volume: 56
  start-page: 101
  year: 2013
  ident: 10048_CR8
  publication-title: Chaos, Solitons Fractals
  doi: 10.1016/j.chaos.2013.07.013
– volume: 87
  start-page: 2407
  issue: 4
  year: 2017
  ident: 10048_CR44
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-016-3199-x
– ident: 10048_CR26
– volume: 40
  start-page: 3860
  issue: 5–6
  year: 2016
  ident: 10048_CR29
  publication-title: Appl Math Model
  doi: 10.1016/j.apm.2015.10.052
– ident: 10048_CR1
  doi: 10.1109/IC3.2015.7346660
– volume: 29
  start-page: 993
  issue: 4
  year: 2018
  ident: 10048_CR37
  publication-title: Neural Comput & Applic
  doi: 10.1007/s00521-016-2511-5
– volume: 58
  start-page: 16
  year: 2014
  ident: 10048_CR42
  publication-title: Chaos, Solitons Fractals
  doi: 10.1016/j.chaos.2013.11.001
– volume: 82
  start-page: 1867
  issue: 4
  year: 2015
  ident: 10048_CR46
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-015-2283-y
– ident: 10048_CR49
– ident: 10048_CR50
  doi: 10.1109/SOCPAR.2015.7492812
– ident: 10048_CR17
  doi: 10.1007/11596219_5
– volume: 61
  start-page: 1041
  year: 2017
  ident: 10048_CR66
  publication-title: Appl Soft Comput
  doi: 10.1016/j.asoc.2017.02.034
– ident: 10048_CR76
  doi: 10.1007/978-3-642-29694-9_17
– volume: 1
  start-page: 330
  issue: 4
  year: 2010
  ident: 10048_CR78
  publication-title: Int J Math Model Num Optim
– volume: 128
  start-page: 155
  year: 2016
  ident: 10048_CR12
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2016.03.021
– volume: 74
  start-page: 551
  issue: 3
  year: 2013
  ident: 10048_CR56
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-013-0987-4
– volume: 226
  start-page: 1830
  issue: 2
  year: 2007
  ident: 10048_CR58
  publication-title: J Comput Phys
  doi: 10.1016/j.jcp.2007.06.008
– volume: 73
  start-page: 1795
  issue: 3
  year: 2013
  ident: 10048_CR40
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-013-0904-x
– ident: 10048_CR11
  doi: 10.1109/IWCMC.2015.7289152
– volume: 24
  start-page: 1659
  issue: 7–8
  year: 2014
  ident: 10048_CR53
  publication-title: Neural Comput & Applic
  doi: 10.1007/s00521-013-1402-2
– volume: 6
  start-page: 55405
  year: 2018
  ident: 10048_CR7
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2871557
– volume: 70
  start-page: 1791
  issue: 3
  year: 2012
  ident: 10048_CR31
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-012-0573-1
– volume: 23
  start-page: 413
  issue: 2
  year: 2005
  ident: 10048_CR68
  publication-title: Chaos, Solitons Fractals
  doi: 10.1016/j.chaos.2004.04.023
– volume: 8
  start-page: 247
  issue: 2
  year: 2016
  ident: 10048_CR32
  publication-title: Cryptogr Commun
  doi: 10.1007/s12095-015-0170-5
– ident: 10048_CR64
  doi: 10.1109/ISCAS.2013.6571881
– ident: 10048_CR72
  doi: 10.1109/ECBI.2009.15
– volume: 11
  start-page: 659
  issue: 4
  year: 2017
  ident: 10048_CR57
  publication-title: SIViP
  doi: 10.1007/s11760-016-1007-1
– volume: 27
  start-page: 229
  issue: 3
  year: 2002
  ident: 10048_CR52
  publication-title: Des Codes Crypt
  doi: 10.1023/A:1019991004496
– ident: 10048_CR24
  doi: 10.1109/IIHMSP.2011.67
– volume: 88
  start-page: 1059
  issue: 2
  year: 2017
  ident: 10048_CR28
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-016-3295-y
– volume: 43
  start-page: 190
  issue: 3
  year: 2019
  ident: 10048_CR6
  publication-title: Cryptologia
  doi: 10.1080/01611194.2018.1548390
– volume: 130
  start-page: 1438
  year: 2017
  ident: 10048_CR10
  publication-title: Optik
  doi: 10.1016/j.ijleo.2016.11.152
– ident: 10048_CR77
  doi: 10.1109/NABIC.2009.5393690
– ident: 10048_CR23
  doi: 10.1007/3-540-46416-6_30
– ident: 10048_CR47
  doi: 10.1109/ICATCCT.2016.7912073
– volume: 4
  start-page: 322
  issue: 4
  year: 2012
  ident: 10048_CR25
  publication-title: Res J Appl Sci Eng Technol
– ident: 10048_CR59
  doi: 10.1093/oso/9780198502135.003.0003
– volume: 87
  start-page: 337
  issue: 1
  year: 2017
  ident: 10048_CR13
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-016-3046-0
– ident: 10048_CR30
  doi: 10.1007/s11071-012-0573-1
– volume: 78
  start-page: 245
  year: 2015
  ident: 10048_CR43
  publication-title: Chaos, Solitons Fractals
  doi: 10.1016/j.chaos.2015.08.001
– volume: 374
  start-page: 3733
  issue: 36
  year: 2010
  ident: 10048_CR55
  publication-title: Phys Lett A
  doi: 10.1016/j.physleta.2010.07.019
– volume: 135
  start-page: 325
  issue: 6
  year: 1988
  ident: 10048_CR62
  publication-title: IEE Proc E-Comput Digit Tech
  doi: 10.1049/ip-e.1988.0044
– ident: 10048_CR60
  doi: 10.1109/ICUFN.2017.7993947
– volume: 27
  start-page: 232
  issue: 1
  year: 2016
  ident: 10048_CR69
  publication-title: J Syst Eng Electron
– volume: 70
  start-page: 2303
  issue: 3
  year: 2012
  ident: 10048_CR39
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-012-0621-x
– volume: 9
  start-page: 1335
  issue: 6
  year: 2015
  ident: 10048_CR38
  publication-title: SIViP
  doi: 10.1007/s11760-013-0577-4
– ident: 10048_CR3
  doi: 10.1007/978-981-10-5687-1_75
– volume: 3
  start-page: 751
  issue: 3
  year: 2007
  ident: 10048_CR21
  publication-title: Int J Innov Comput, Inform Control
– volume: 2
  issue: 4
  year: 2007
  ident: 10048_CR63
  publication-title: PLoS One
  doi: 10.1371/journal.pone.0000354
– volume: 66
  start-page: 1115
  issue: 4
  year: 2013
  ident: 10048_CR35
  publication-title: Comput Ind Eng
  doi: 10.1016/j.cie.2013.08.003
– volume: 28
  start-page: 656
  issue: 4
  year: 1949
  ident: 10048_CR65
  publication-title: Bell Labs Tech J
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– volume: 57
  start-page: 572
  year: 2015
  ident: 10048_CR2
  publication-title: Proc Comput Sci
  doi: 10.1016/j.procs.2015.07.394
– volume: 8
  start-page: 89
  issue: 4
  year: 2014
  ident: 10048_CR79
  publication-title: Int J Sec Appl
– volume: 87
  start-page: 1081
  issue: 2
  year: 2017
  ident: 10048_CR19
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-016-3099-0
– volume: 10
  start-page: 179
  year: 1960
  ident: 10048_CR45
  publication-title: Proc Sympos Appl Math Combinatorial Anal
  doi: 10.1090/psapm/010/0113289
– ident: 10048_CR54
  doi: 10.1007/s00521-017-3287-y
– ident: 10048_CR75
  doi: 10.1007/3-540-39799-X_41
– volume: 21
  start-page: 245
  issue: 3
  year: 2019
  ident: 10048_CR80
  publication-title: Entropy
  doi: 10.3390/e21030245
– volume: 48
  start-page: 163
  issue: 2
  year: 2001
  ident: 10048_CR33
  publication-title: IEEE Trans Circ Syst I: Fund Theory Appl
  doi: 10.1109/81.904880
– volume: 20
  start-page: 525
  issue: 7
  year: 2018
  ident: 10048_CR5
  publication-title: Entropy
  doi: 10.3390/e20070525
– ident: 10048_CR18
  doi: 10.1007/978-3-540-85912-3_31
– ident: 10048_CR61
  doi: 10.1007/978-3-319-10762-2_81
– volume: 376
  start-page: 827
  issue: 6
  year: 2012
  ident: 10048_CR73
  publication-title: Phys Lett A
  doi: 10.1016/j.physleta.2012.01.009
– volume: 35
  start-page: 129
  issue: 1
  year: 2007
  ident: 10048_CR16
  publication-title: Hum Ecol
  doi: 10.1007/s10745-006-9083-4
– volume: 443
  start-page: 281
  issue: 7109
  year: 2006
  ident: 10048_CR67
  publication-title: Nature
  doi: 10.1038/443281a
– volume: 48
  start-page: 3349
  issue: 12
  year: 2018
  ident: 10048_CR82
  publication-title: IEEE Trans Cybernet
  doi: 10.1109/TCYB.2018.2846186
– volume: 9
  start-page: 217
  issue: 7
  year: 2015
  ident: 10048_CR81
  publication-title: Int J Sec Appl
– volume: 27
  start-page: 677
  issue: 3
  year: 2016
  ident: 10048_CR41
  publication-title: Neural Comput & Applic
  doi: 10.1007/s00521-015-1887-y
– volume: 453
  start-page: 495
  issue: 7194
  year: 2008
  ident: 10048_CR9
  publication-title: Nature
  doi: 10.1038/nature06948
– volume: 90
  start-page: 2033
  issue: 4
  year: 2016
  ident: 10048_CR34
  publication-title: Wirel Pers Commun
  doi: 10.1007/s11277-016-3436-0
– volume: 9
  start-page: 1281
  issue: 6
  year: 2015
  ident: 10048_CR14
  publication-title: SIViP
  doi: 10.1007/s11760-013-0570-y
– volume: 20
  start-page: 3349
  issue: 9
  year: 2016
  ident: 10048_CR74
  publication-title: Soft Comput
  doi: 10.1007/s00500-015-1726-1
– volume: 70
  start-page: 1559
  issue: 3
  year: 2014
  ident: 10048_CR27
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-012-1173-2
SSID ssj0016524
Score 2.5306726
Snippet Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 7333
SubjectTerms Boxes
Computer Communication Networks
Computer Science
Criteria
Cryptography
Data Structures and Information Theory
Encryption
Heuristic methods
Multimedia Information Systems
Nonlinearity
Performance evaluation
Search algorithms
Special Purpose and Application-Based Systems
SummonAdditionalLinks – databaseName: SpringerLink Journals (ICM)
  dbid: U2A
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDI5gXODAY4AYDJQDN4jUpK_0OCGmCQkuMGmcKjdJGWK009Yhfj5Jmm6AAIlrm6aSHcefZfszQuc8YzKT4BMeAJCAiYCAFEB0POTJJGaRbymFbu-iwTC4GYUj1xQ2b6rdm5SkvalXzW7UtJKYcMewnHHC19FGaGJ3fYqHrLfMHUShG2XLPaL9IXWtMj_v8dUdrTDmt7So9Tb9XbTtYCLu1XrdQ2uqaKOdZgQDdhbZRluf-AT30WMPF-WbmuB6LjQuc3xPsvIdS1ungY3L0k8LbHpxZxouYzGGUv8Cv8J0jqGQWCzES1ni2gAwTJ7K2XM1fj1Aw_71w9WAuNkJRPhRXBEVKemLLNHOR8XatHLDQxZz4DSUGQVQyuNAWZ54yiRKFafgMRGyOEkCRiPlH6JWURbqCGGqGDc4UUcmEADLuQYtodB7Q27zqh1EGxGmwhGLm_kWk3RFiWzEnmqxp1bsKe-gi-U305pW48_V3UYzqTOxeWqoDvVloiFUB1022lq9_n234_8tP0GbzNSx2ErtLmpVs4U61UCkys7sufsAxYDQ1A
  priority: 102
  providerName: Springer Nature
Title A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm
URI https://link.springer.com/article/10.1007/s11042-020-10048-8
https://www.proquest.com/docview/2492794065
Volume 80
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT-MwEB4BvbAH3iu6QOUDt12L2HnUPaGCWhAItIKtBKdoYjsgUZIuLav9-YwThwISXJ3EkcYez4xn5vsA9lUmTWYw5CpC5JHUEUejkVM8FJheVyZhBSl0cZmcjqKzm_jGX7hNfVllcyZWB7UptbsjP3DIdrR3yGIeTv5yxxrlsqueQmMRWnQEKwq-WkeDy99Xr3mEJPa0tirgZBuFb5upm-eEa01x4ZNDTVNcvTdNc3_zQ4q0sjzDNVjxLiPr12u8Dgu22IDVho6Bee3cgG9vsAU34bbPivKfHbOaI5qVObvmWfmfmapmgznzRaMFc325T-Q6M32PJf2CPeJkyrAwTD_rh7JktTIwHN-RPGb3j1swGg7-HJ9yz6PAdZh0Z9wm1oQ665Ehsl1Ss9xhknUVKhGbTCBaGygUMu8F1iVNrRIYSB2TuHuRFIkNv8NSURZ2G5iwUjmfkaIUjFDmihyYWNPcmFc51jaIRoSp9iDjjutinM7hkZ3YUxJ7Wok9VW34-frNpIbY-PLt3WZlUq9u03S-Odrwq1mt-ePPZ_vx9Ww7sCxdDUtVpb0LS7OnZ7tHTsgs68CiGp50oNU_uT0fdPy-o9GR7L8AvIzY2g
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTxRBEK4gHJSDKGpYBa2DnrTjdM9jew7EEHRd5HEREjyNPd09krDMLOwi8Kf8jVTNg0UTuXGdma5OqqvrMVX1FcBbnSuXOxMKHRkjImUjYZw1guKhwKV9lYQ1pNDuXjI8iL4dxodz8KfrheGyyk4n1oraVZb_kX9kZDuSHbKYn8angqdGcXa1G6HRiMW2v7qgkG2yvvWZzvedUoMv-5tD0U4VEDZM-lPhE-9Cm6ekln2fhK5ghK6-NlrGLpfGeB9oI1WRBp5TiF5LEygb0-ZppGTiQ6L7ABaiMEz5RunB15usRRK3Q3R1IMgSy7ZJp2nVk9wIw8EaY7Rpof82hDPv9p-EbG3nBk_gceug4kYjUU9hzpfLsNQNf8BWFyzD4i0kw2fwYwPL6rcfYTORGqsCv4u8ukRXV4ggG0t6WiJ3AZ-Ro472yFS0BZ6Y8QRN6dCe2-OqwobHaEa_iPvTo5PncHAv_H0B82VV-hVA6ZVmD5ViIhMZVWhyl2JLtE1RZ3R7IDsWZraFNOfJGqNsBsbMbM-I7VnN9kz34P3NmnED6HHn16vdyWTt5Z5kM1HswYfutGav_0_t5d3U3sDD4f7uTraztbf9Ch4prp6p68NXYX56du7XyP2Z5q9rmUP4ed9Cfg33jBAW
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9RADLbKVkJw4FFALBTwAU4wambymj0gVGhXLYVVBVQqp-DMTKjENlm6Wx5_jV-HJ5l0AYnees3DiTxfxnZsfwZ4rEtlS0ux0AmRSJRJBFlDguOhyI5ylcUtpdDbSbZzkLw-TA9X4FffC-PLKvs9sd2obWP8P_INz2zH2GGLuVGFsoj9rfGL2VfhJ0j5TGs_TqODyJ77-Z3Dt_nz3S1e6ydKjbc_vNoRYcKAMHGWL4TLnI1NOeIt2uUMwMqzdeWatExtKYmcizRJVY0i59OJTkuKlEn5RUaJkpmLWe4lWM05KooGsPpye7L_7iyHkaVhpK6OBNtlGVp2usY96dtifOjmGdu00H-bxaWv-096trV64xtwLbiruNnh6yasuHoNrvejIDDsDGtw9Q9ew1vwcRPr5pubYjefGpsK34uy-YG2rRdBbzr5aI2-J_iE3XY0R9TwI_CYZnOk2qI5NV-aBjstI00_s_4XR8e34eBCNHwHBnVTu7uA0int_VWOkCghVWl2nlLDsqlq87tDkL0KCxMIzv2cjWmxpGb2ai9Y7UWr9kIP4enZPbOO3uPcq9f7lSnCpz4vlsAcwrN-tZan_y_t3vnSHsFlBnjxZneydx-uKF9K0xaLr8NgcXLqHrAvtCgfBtAhfLponP8GgHMVqA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+method+of+S-box+design+based+on+discrete+chaotic+maps+and+cuckoo+search+algorithm&rft.jtitle=Multimedia+tools+and+applications&rft.au=Alhadawi%2C+Hussam+S&rft.au=Majid%2C+Mazlina+Abdul&rft.au=Lambi%C4%87+Dragan&rft.au=Musheer%2C+Ahmad&rft.date=2021-02-01&rft.pub=Springer+Nature+B.V&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=80&rft.issue=5&rft.spage=7333&rft.epage=7350&rft_id=info:doi/10.1007%2Fs11042-020-10048-8&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon