A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm
Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer resistance to cryptanalysis. The construction of strong S-boxes has gained considerable attention in the area of cryptography. In fact, the security o...
Saved in:
Published in | Multimedia tools and applications Vol. 80; no. 5; pp. 7333 - 7350 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.02.2021
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer resistance to cryptanalysis. The construction of strong S-boxes has gained considerable attention in the area of cryptography. In fact, the security of transmitted data is highly dependent on the strength of the S-boxes for the prevention of unauthorised access. Therefore, the creation of strong S-box with high nonlinearity score has been considered a significant challenge. This study presented a novel method for the designing of 8 × 8 S-boxes with selected cryptographic characteristics based on a cuckoo search (CS) algorithm and discrete-space chaotic map. Notably, the advantage of the proposed approach is indicated through the efficient randomisation and lower adjustable parameters in CS compared to GA and PSO. Also, this approach utilised a 1D discrete-space chaotic map with virtually unlimited key space to design initial S-boxes, which is another advantage over the methods based on continuous-space chaotic maps, which consist of the limited key space. Moreover, chaotic maps have a potential to overcome the trapping problem of a standard CS in the local optima, and they were used to generate initial S-boxes to achieve the desired quality and facilitate the metaheuristic search. Accordingly, the metaheuristic CS was used to find a notable S-box configuration which fulfilled the established criteria. This objective was achieved by searching for the optimal or near-optimal features which maximised the given fitness function. The performance of the proposed method was evaluated based on the established performance evaluation criteria, including bijectivity, nonlinearity, strict avalanche criteria, bit independence criteria, differential uniformity, and linear probability. Based on the results of proposed method performance was benchmarked against the results of the recently developed S-boxes, it was indicated that the S-boxes exhibited good cryptographic features and could resist various cryptanalysis attacks. |
---|---|
AbstractList | Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer resistance to cryptanalysis. The construction of strong S-boxes has gained considerable attention in the area of cryptography. In fact, the security of transmitted data is highly dependent on the strength of the S-boxes for the prevention of unauthorised access. Therefore, the creation of strong S-box with high nonlinearity score has been considered a significant challenge. This study presented a novel method for the designing of 8 × 8 S-boxes with selected cryptographic characteristics based on a cuckoo search (CS) algorithm and discrete-space chaotic map. Notably, the advantage of the proposed approach is indicated through the efficient randomisation and lower adjustable parameters in CS compared to GA and PSO. Also, this approach utilised a 1D discrete-space chaotic map with virtually unlimited key space to design initial S-boxes, which is another advantage over the methods based on continuous-space chaotic maps, which consist of the limited key space. Moreover, chaotic maps have a potential to overcome the trapping problem of a standard CS in the local optima, and they were used to generate initial S-boxes to achieve the desired quality and facilitate the metaheuristic search. Accordingly, the metaheuristic CS was used to find a notable S-box configuration which fulfilled the established criteria. This objective was achieved by searching for the optimal or near-optimal features which maximised the given fitness function. The performance of the proposed method was evaluated based on the established performance evaluation criteria, including bijectivity, nonlinearity, strict avalanche criteria, bit independence criteria, differential uniformity, and linear probability. Based on the results of proposed method performance was benchmarked against the results of the recently developed S-boxes, it was indicated that the S-boxes exhibited good cryptographic features and could resist various cryptanalysis attacks. |
Author | Alhadawi, Hussam S. Majid, Mazlina Abdul Ahmad, Musheer Lambić, Dragan |
Author_xml | – sequence: 1 givenname: Hussam S. orcidid: 0000-0003-2179-4383 surname: Alhadawi fullname: Alhadawi, Hussam S. email: hussam.alhadawi@tdtu.edu.vn organization: Informetrics Research Group, Ton Duc Thang University, Faculty of Information Technology, Ton Duc Thang University – sequence: 2 givenname: Mazlina Abdul surname: Majid fullname: Majid, Mazlina Abdul organization: Faculty of Computer System and Software Engineering, University Malaysia Pahang – sequence: 3 givenname: Dragan surname: Lambić fullname: Lambić, Dragan organization: Faculty of Education, University of Novi Sad – sequence: 4 givenname: Musheer surname: Ahmad fullname: Ahmad, Musheer organization: Department of Computer Engineering |
BookMark | eNp9kE1LAzEQhoNUsH78AU8Bz9FJ9iPZoxS_oOBBPXgK2exsu7VNapKK_ntTKwgeespkeJ6Z4T0mI-cdEnLO4ZIDyKvIOZSCgQCW_6Vi6oCMeSULJqXgo1wXCpisgB-R4xgXALyuRDkmr9fU-Q9c0hWmue-o7-kTa_0n7TAOM0dbEzF3He2GaAMmpHZufBosXZl1pMZ11G7sm_c0ogl2Ts1y5sOQ5qtTctibZcSz3_eEvNzePE_u2fTx7mFyPWW2qGViWGNX2LZRpUTZAvRlxblURvGqa7kxiKAMF30DWG0ZxQ0IWwnZNKXgNRYn5GI3dx38-wZj0gu_CS6v1KJsMldCXWVK7SgbfIwBe22HZNLgXQpmWGoOehuk3gWpc5D6J0itsir-qeswrEz42i8VOylm2M0w_F21x_oGmluGfA |
CitedBy_id | crossref_primary_10_1007_s11760_024_03109_0 crossref_primary_10_1007_s40747_023_00988_7 crossref_primary_10_1109_ACCESS_2022_3218062 crossref_primary_10_1038_s41598_023_47607_6 crossref_primary_10_1140_epjs_s11734_022_00472_2 crossref_primary_10_1155_2021_9698371 crossref_primary_10_1007_s00521_021_06260_8 crossref_primary_10_3390_math10132172 crossref_primary_10_1007_s00521_022_07589_4 crossref_primary_10_1109_ACCESS_2024_3378731 crossref_primary_10_1016_j_eswa_2021_115305 crossref_primary_10_1016_j_eswa_2024_124904 crossref_primary_10_1109_ACCESS_2021_3086717 crossref_primary_10_1109_ACCESS_2022_3217211 crossref_primary_10_54365_adyumbd_1334213 crossref_primary_10_1007_s00500_024_09751_7 crossref_primary_10_2478_ias_2024_0018 crossref_primary_10_1007_s11042_024_19053_7 crossref_primary_10_1109_ACCESS_2023_3339389 crossref_primary_10_3390_pr10091675 crossref_primary_10_1007_s11071_024_10414_3 crossref_primary_10_1109_ACCESS_2023_3298111 crossref_primary_10_1016_j_chaos_2024_115952 crossref_primary_10_3390_s22145325 crossref_primary_10_1109_ACCESS_2021_3077194 crossref_primary_10_1016_j_csi_2024_103890 crossref_primary_10_3390_sym16080954 crossref_primary_10_1007_s11265_022_01744_9 crossref_primary_10_1109_ACCESS_2024_3410668 crossref_primary_10_1155_2022_1502988 crossref_primary_10_1016_j_vlsi_2023_05_006 crossref_primary_10_1109_ACCESS_2022_3151174 crossref_primary_10_1109_ACCESS_2023_3266290 crossref_primary_10_1007_s11760_023_02984_3 crossref_primary_10_32604_cmc_2023_041187 crossref_primary_10_1109_ACCESS_2023_3346319 crossref_primary_10_1007_s11042_023_14910_3 crossref_primary_10_1016_j_ins_2021_07_036 crossref_primary_10_1088_1402_4896_ad8a9c crossref_primary_10_1109_ACCESS_2023_3313180 crossref_primary_10_3389_fphy_2022_902500 crossref_primary_10_1007_s10470_022_02061_8 crossref_primary_10_3934_era_2023137 crossref_primary_10_1088_1402_4896_ac59fa crossref_primary_10_1007_s00500_024_09912_8 crossref_primary_10_1007_s13198_022_01766_3 crossref_primary_10_1007_s11042_023_15240_0 crossref_primary_10_1109_ACCESS_2022_3218643 crossref_primary_10_1016_j_icte_2022_11_005 crossref_primary_10_1007_s13369_021_05666_9 crossref_primary_10_32604_cmc_2023_037516 crossref_primary_10_1007_s11042_023_14394_1 crossref_primary_10_1109_ACCESS_2022_3209202 crossref_primary_10_1007_s13369_023_07715_x crossref_primary_10_1016_j_matcom_2023_04_020 crossref_primary_10_3390_app14209572 crossref_primary_10_1016_j_heliyon_2023_e15902 crossref_primary_10_1109_ACCESS_2021_3090163 crossref_primary_10_1142_S0218127422501632 crossref_primary_10_1007_s00521_023_08243_3 crossref_primary_10_32604_jihpp_2024_058954 crossref_primary_10_1109_ACCESS_2021_3095618 crossref_primary_10_1155_2022_8338508 crossref_primary_10_1007_s11042_023_17046_6 crossref_primary_10_1007_s10489_022_03174_3 crossref_primary_10_1007_s11042_021_11635_z crossref_primary_10_1007_s11042_021_10587_8 crossref_primary_10_1109_ACCESS_2021_3087139 crossref_primary_10_1007_s11277_021_08981_4 crossref_primary_10_1007_s11042_023_17200_0 crossref_primary_10_1007_s11042_023_17720_9 crossref_primary_10_1016_j_knosys_2025_112968 crossref_primary_10_1007_s11042_023_17763_y crossref_primary_10_35193_bseufbd_1323521 crossref_primary_10_3934_math_20241681 crossref_primary_10_3934_math_2024303 crossref_primary_10_7717_peerj_cs_940 crossref_primary_10_1007_s11042_022_13612_6 crossref_primary_10_3390_sym16081070 crossref_primary_10_1007_s11277_023_10456_7 crossref_primary_10_1007_s00521_023_09095_7 crossref_primary_10_3390_math11102322 crossref_primary_10_1155_2022_2532497 crossref_primary_10_1007_s00521_022_07899_7 crossref_primary_10_1109_ACCESS_2021_3113338 crossref_primary_10_1007_s11042_023_15965_y crossref_primary_10_1109_ACCESS_2021_3093247 crossref_primary_10_1007_s11277_024_11104_4 crossref_primary_10_1109_ACCESS_2022_3184012 |
Cites_doi | 10.1007/BF00630563 10.1016/j.physa.2014.06.020 10.1007/s13319-017-0119-x 10.1016/j.chaos.2006.08.003 10.1007/978-3-319-03753-0_47 10.1007/3-540-48285-7_33 10.1007/s00521-018-3557-3 10.1016/j.chaos.2013.07.013 10.1007/s11071-016-3199-x 10.1016/j.apm.2015.10.052 10.1109/IC3.2015.7346660 10.1007/s00521-016-2511-5 10.1016/j.chaos.2013.11.001 10.1007/s11071-015-2283-y 10.1109/SOCPAR.2015.7492812 10.1007/11596219_5 10.1016/j.asoc.2017.02.034 10.1007/978-3-642-29694-9_17 10.1016/j.sigpro.2016.03.021 10.1007/s11071-013-0987-4 10.1016/j.jcp.2007.06.008 10.1007/s11071-013-0904-x 10.1109/IWCMC.2015.7289152 10.1007/s00521-013-1402-2 10.1109/ACCESS.2018.2871557 10.1007/s11071-012-0573-1 10.1016/j.chaos.2004.04.023 10.1007/s12095-015-0170-5 10.1109/ISCAS.2013.6571881 10.1109/ECBI.2009.15 10.1007/s11760-016-1007-1 10.1023/A:1019991004496 10.1109/IIHMSP.2011.67 10.1007/s11071-016-3295-y 10.1080/01611194.2018.1548390 10.1016/j.ijleo.2016.11.152 10.1109/NABIC.2009.5393690 10.1007/3-540-46416-6_30 10.1109/ICATCCT.2016.7912073 10.1093/oso/9780198502135.003.0003 10.1007/s11071-016-3046-0 10.1016/j.chaos.2015.08.001 10.1016/j.physleta.2010.07.019 10.1049/ip-e.1988.0044 10.1109/ICUFN.2017.7993947 10.1007/s11071-012-0621-x 10.1007/s11760-013-0577-4 10.1007/978-981-10-5687-1_75 10.1371/journal.pone.0000354 10.1016/j.cie.2013.08.003 10.1002/j.1538-7305.1949.tb00928.x 10.1016/j.procs.2015.07.394 10.1007/s11071-016-3099-0 10.1090/psapm/010/0113289 10.1007/s00521-017-3287-y 10.1007/3-540-39799-X_41 10.3390/e21030245 10.1109/81.904880 10.3390/e20070525 10.1007/978-3-540-85912-3_31 10.1007/978-3-319-10762-2_81 10.1016/j.physleta.2012.01.009 10.1007/s10745-006-9083-4 10.1038/443281a 10.1109/TCYB.2018.2846186 10.1007/s00521-015-1887-y 10.1038/nature06948 10.1007/s11277-016-3436-0 10.1007/s11760-013-0570-y 10.1007/s00500-015-1726-1 10.1007/s11042-012-1173-2 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2020 Springer Science+Business Media, LLC, part of Springer Nature 2020. |
Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020 – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020. |
DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI Q9U |
DOI | 10.1007/s11042-020-10048-8 |
DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Global (Alumni Edition) Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) Research Library (Alumni) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student ProQuest Research Library ProQuest SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central Basic |
DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | ABI/INFORM Global (Corporate) |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1573-7721 |
EndPage | 7350 |
ExternalDocumentID | 10_1007_s11042_020_10048_8 |
GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ACMFV ACSTC ADHKG ADKFA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT 7SC 7XB 8AL 8FD 8FK ABRTQ JQ2 L.- L7M L~C L~D MBDVC PKEHL PQEST PQGLB PQUKI Q9U |
ID | FETCH-LOGICAL-c367t-e6ed3cb9847e7b00f451178a815db1aaee08a12f90e5847e81a02c527994216e3 |
IEDL.DBID | BENPR |
ISSN | 1380-7501 |
IngestDate | Sat Jul 26 00:02:35 EDT 2025 Tue Jul 01 04:13:07 EDT 2025 Thu Apr 24 22:54:54 EDT 2025 Fri Feb 21 02:49:38 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Keywords | Chaos CS optimization Cryptography S-boxes |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c367t-e6ed3cb9847e7b00f451178a815db1aaee08a12f90e5847e81a02c527994216e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-2179-4383 |
PQID | 2492794065 |
PQPubID | 54626 |
PageCount | 18 |
ParticipantIDs | proquest_journals_2492794065 crossref_citationtrail_10_1007_s11042_020_10048_8 crossref_primary_10_1007_s11042_020_10048_8 springer_journals_10_1007_s11042_020_10048_8 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-02-01 |
PublicationDateYYYYMMDD | 2021-02-01 |
PublicationDate_xml | – month: 02 year: 2021 text: 2021-02-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: Dordrecht |
PublicationSubtitle | An International Journal |
PublicationTitle | Multimedia tools and applications |
PublicationTitleAbbrev | Multimed Tools Appl |
PublicationYear | 2021 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Rodrigues D, Pereira LA, Almeida T, Papa JP, Souza A, Ramos CC, Yang X-S BCS (2013) A binary cuckoo search algorithm for feature selection. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on. IEEE, pp 465–468 ZaghloulAZhangTHouHAminMEl-LatifAAAEl-WahabMSAA block encryption scheme for secure still visual data based on one-way coupled map latticeInt J Sec Appl20148489100 LambićDA novel method of S-box design based on chaotic map and composition methodChaos, Solitons Fractals20145816211348.94064 MurphySRobshawMJBKey-dependent S-boxes and differential cryptanalysisDes Codes Crypt200227322925519284401022.94011 TangGLiaoXChenYA novel method for designing S-boxes based on chaotic mapsChaos, Solitons Fractals20052324134191068.94017 BelaziAEl-LatifAAABelghithSA novel image encryption scheme based on substitution-permutation network and chaosSignal Process2016128155170 TianYLuZS-box: six-dimensional compound hyperchaotic map and artificial bee colony algorithmJ Syst Eng Electron2016271232241 El-LatifAAALiLNiuXA new image encryption scheme based on cyclic elliptic curve and chaotic systemMultimed Tools Appl201470315591584 KhanMShahTAn efficient construction of substitution box with fractional chaotic systemSIViP201596133513383351826 AlzaidiAAAhmadMDojaMNAl SolamiEBegMSA new 1D chaotic map and $\beta $-hill climbing for generating substitution-boxesIEEE Access201865540555418 El-LatifAAALiLWangNPengJ-LShiZ-FNiuXA new image encryption scheme for secure digital images based on combination of polynomial chaotic mapsRes J Appl Sci Eng Technol201244322328 Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. Int Conf Elect Comm Bus Intel 125–128 ShannonCECommunication theory of secrecy systemsBell Labs Tech J1949284656715321331200.94005 AhmadMBhatiaDHassanYA novel ant colony optimization based scheme for substitution box designProc Comput Sci201557572580 Manjula G, Mohan H (2016) Constructing key dependent dynamic S-Box for AES block cipher system. In: 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, pp 613–617 Webster A, Tavares SE (1985) On the design of S-boxes. Conf Theory Appl Cryptograph Tech:523–534 KazakevičiusRRuseckasJLévy flights in inhomogeneous environments and 1/f noisePhys A: Stat Mech Appl2014411951031395.82190 KanagarajGPonnambalamSJawaharNA hybrid cuckoo search and genetic algorithm for reliability–redundancy allocation problemsComput Ind Eng201366411151124 AlhadawiHSZolkipliMFIsmailSMLambićDDesigning a pseudorandom bit generator based on LFSRs and a discrete chaotic mapCryptologia2019433190211 Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press Ahmad M, Ahmad F, Nasim Z, Bano Z, Zafar S (2015) Designing chaos based strong substitution box. Paper presented at the eighth international conference on contemporary computing (IC3) (2015) Yang X-S (2013) Bat algorithm and cuckoo search: a tutorial. In: Artificial Intelligence, Evolutionary Computing and Metaheuristics. Springer, pp. 421–434 Payne RB, Sorensen MD (2005) The cuckoos, vol 15. Oxford University Press Peng J, El-Latif AAA, Belazi A, Kotulski Z (2017) Efficient chaotic nonlinear component for secure cryptosystems. In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, pp 989–993 LambićDA novel method of S-box design based on discrete chaotic mapNonlinear Dyn2017874240724133608831 AhmedHAZolkipliMFAhmadMA novel efficient substitution-box design based on firefly algorithm and discrete chaotic mapNeural Comput & Applic2018317201721010.1007/s00521-018-3557-3 KhanMShahTMahmoodHGondalMAHussainIA novel technique for the construction of strong S-boxes based on chaotic Lorenz systemsNonlinear Dyn2012703230323112992216 Picek S, Marchiori E, Batina L, Jakobovic D (2014) Combining evolutionary computation and algebraic constructions to find cryptography-relevant Boolean functions. In: International Conference on Parallel Problem Solving from Nature. Springer, pp 822–831 TianYLuZChaotic S-box: intertwining logistic map and bacterial foraging optimizationMath Probl Eng2017201711137297191426.94127 WangYWongK-WLiCLiYA novel method to design S-box based on chaotic map and genetic algorithmPhys Lett A201237668278331255.81165 OuaarabAAhiodBYangX-SDiscrete cuckoo search algorithm for the travelling salesman problemNeural Comput & Applic2014247–816591669 Özkaynak F (2017) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 1–10 BihamEShamirADifferential cryptanalysis of DES-like cryptosystemsJ Cryptol19914137212027860729.68017 LambićDA new discrete chaotic map based on the composition of permutationsChaos, Solitons Fractals20157824524833942441353.37031 Carlet C (2005) On highly nonlinear S-boxes and their inability to thwart DPA attacks. In: INDOCRYPT. Springer, pp 49–62 ShehabMKhaderATAl-BetarMAA survey on applications and variants of the cuckoo search algorithmAppl Soft Comput20176110411059 ÖzkaynakFÇelikVÖzerABA new S-box construction method based on the fractional-order chaotic Chen systemSIViP2017114659664 LehmerDHTeaching combinatorial tricks to a computerProc Sympos Appl Math Combinatorial Anal1960101791931132890096.00504 ShlesingerMFMathematical physics: search researchNature20064437109281282 IvanovGNikolovNNikovaSReversed genetic algorithms for generation of bijective s-boxes with good cryptographic propertiesCryptogr Commun20168224727634882191338.94074 ÖzkaynakFÖzerABA method for designing strong S-boxes based on chaotic Lorenz systemPhys Lett A201037436373337381238.34085 PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E-Comput Digit Tech19881356325335 Matsui M (1993) Linear cryptanalysis method for DES cipher. Workshop Theory Appl Cryptograph Techn 386–397 CuiLCaoYA new S-box structure named affine-power-affineInt J Innov Comput, Inform Control200733751759 BenrhoumaOHermassiHEl-LatifAAABelghithSCryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domainSIViP20159612811286 ZahidAHArshadMJAhmadMA novel construction of efficient substitution-boxes using cubic fractional transformationEntropy20192132453943228 Dawson M, Tavares SE (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Workshop Theory Appl Cryptograph Techn 352–367 PavlyukevichILévy flights, non-local search and simulated annealingJ Comput Phys200722621830184423563961125.65009 ChenGA novel heuristic method for obtaining S-boxesChaos, Solitons Fractals20083641028103623793681131.94012 JamalSSKhanMUShahTA watermarking technique with chaotic fractional S-box transformationWirel Pers Commun201690420332049 ZhangTEl-FatyanyALiLAminMEl-LatifAAASecret sharing-based chaotic image encryptionInt J Sec Appl201597217224 BrownCTLiebovitchLSGlendonRLévy flights in Dobe Ju/‘hoansi foraging patternsHum Ecol2007351129138 Yang X-S, Deb S (2009) Cuckoo search via Lévy flights. In: Nature & Biologically Inspired Computing. NaBIC 2009. World congress on, 2009. IEEE, pp 210–214 FarahTRhoumaRBelghithSA novel method for designing S-box based on chaotic map and teaching–learning-based optimizationNonlinear Dyn201788210591074 WangG-GDebSGandomiAHZhangZAlaviAHChaotic cuckoo searchSoft Comput201620933493362 El-Latif AAA, Li L, Wang N, Li Q, Niu X A (2012) new image encryption based on chaotic systems and singular value decomposition. In: Fourth International Conference on Digital Image Processing (ICDIP 2012). International Society for Optics and Photonics, p 83343F Mohamed NA, El-Azeim MA, Zaghloul A, El-Latif AAA (2015) Image encryption scheme for secure digital images based on 3D cat map and turing machine. In: 2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR). IEEE, pp 230–234 BaronchelliARadicchiFLévy flights in human behavior and cognitionChaos, Solitons Fractals201356101105 JakimoskiGKocarevLChaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Trans Circ Syst I: Fund Theory Appl200148216316918205410998.94016 KhanMShahTGondalMAAn efficient technique for the construction of substitution box with chaotic partial differential equationNonlinear Dyn2013733179518013083821 ÖzkaynakFYavuzSDesigning chaotic S-boxes based on time-delay chaotic systemNonlinear Dyn201374355155731176411344.94069 ÇavuşoğluÜZenginAPehlivanIKaçarSA novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang systemNonlinear Dyn2017872108110941373.68212 Ahmad M, Seeru F, Siddiqi AM, Masood S (2018) Dynamic 9× 9 substitution-boxes using Chaos-based heuristic search. In: soft computing: theories and applications. Springer, pp 839-851 ReynoldsAMFryeMAFree-flight odor tracking in Drosophila is consistent with an optimal intermittent scale-free searchPLoS One200724 Carlet C (2008) On the higher order nonlinearities of Boolean functions and S-boxes, and their generalizations. In: International Conference on Sequences and Their Applications. Springer, pp 345–367 BelaziAKhanMEl-LatifAAABelghithSEfficient cryptosystem approaches: S-boxes and permutation–substitution-based encryptionNonlinear Dyn2017871337361 El-Latif AAA, Li L, Wang N, Niu X (2011) Image encryption scheme of pixel bit based on combination of chaotic systems. In: 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, pp 369–373 Al SolamiEAhmadMVolosCDojaMBegMA new hyperchaotic system-based design for efficient bijective substitution-boxesEntropy2018207525 KhanMAsgharZA novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutationNeural Comput & Applic2018294993999 Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media Belazi A, El-Latif AAA, Rhouma R, Belghith S (2015) Selective image encryption scheme based on DWT, AES S-box and chaotic J Pieprzyk (10048_CR62) 1988; 135 M Ahmad (10048_CR2) 2015; 57 G Jakimoski (10048_CR33) 2001; 48 MF Shlesinger (10048_CR67) 2006; 443 SS Jamal (10048_CR34) 2016; 90 AA Alzaidi (10048_CR7) 2018; 6 S Murphy (10048_CR52) 2002; 27 10048_CR77 10048_CR76 AAA El-Latif (10048_CR25) 2012; 4 10048_CR72 10048_CR75 10048_CR30 A Belazi (10048_CR13) 2017; 87 Ü Çavuşoğlu (10048_CR19) 2017; 87 G Ivanov (10048_CR32) 2016; 8 Y Tian (10048_CR70) 2017; 2017 M Khan (10048_CR39) 2012; 70 CE Shannon (10048_CR65) 1949; 28 M Khan (10048_CR41) 2016; 27 D Lambić (10048_CR42) 2014; 58 Y Wang (10048_CR73) 2012; 376 Y Tian (10048_CR69) 2016; 27 HA Ahmed (10048_CR4) 2018; 31 O Benrhouma (10048_CR14) 2015; 9 P Barthelemy (10048_CR9) 2008; 453 10048_CR48 10048_CR47 M Khan (10048_CR37) 2018; 29 10048_CR49 E Al Solami (10048_CR5) 2018; 20 DH Lehmer (10048_CR45) 1960; 10 G Chen (10048_CR20) 2008; 36 A Belazi (10048_CR12) 2016; 128 F Özkaynak (10048_CR55) 2010; 374 L Cui (10048_CR21) 2007; 3 A Ouaarab (10048_CR53) 2014; 24 X-S Yang (10048_CR78) 2010; 1 E Biham (10048_CR15) 1991; 4 M Khan (10048_CR38) 2015; 9 F ul Islam (10048_CR71) 2017; 8 10048_CR11 T Farah (10048_CR28) 2017; 88 AAA El-Latif (10048_CR27) 2014; 70 10048_CR54 M Khan (10048_CR40) 2013; 73 10048_CR59 M Shehab (10048_CR66) 2017; 61 10048_CR17 L Huang (10048_CR29) 2016; 40 A Zaghloul (10048_CR79) 2014; 8 D Lambić (10048_CR43) 2015; 78 F Özkaynak (10048_CR56) 2013; 74 G Tang (10048_CR68) 2005; 23 T Zhang (10048_CR82) 2018; 48 10048_CR51 10048_CR50 10048_CR3 10048_CR1 F Özkaynak (10048_CR57) 2017; 11 G-G Wang (10048_CR74) 2016; 20 AH Zahid (10048_CR80) 2019; 21 HS Alhadawi (10048_CR6) 2019; 43 T Zhang (10048_CR81) 2015; 9 10048_CR18 G Kanagaraj (10048_CR35) 2013; 66 A Belazi (10048_CR10) 2017; 130 G Liu (10048_CR46) 2015; 82 I Hussain (10048_CR31) 2012; 70 10048_CR22 I Pavlyukevich (10048_CR58) 2007; 226 10048_CR24 AM Reynolds (10048_CR63) 2007; 2 10048_CR23 10048_CR26 D Lambić (10048_CR44) 2017; 87 10048_CR60 A Baronchelli (10048_CR8) 2013; 56 10048_CR61 10048_CR64 CT Brown (10048_CR16) 2007; 35 R Kazakevičius (10048_CR36) 2014; 411 |
References_xml | – reference: Mohamed NA, El-Azeim MA, Zaghloul A, El-Latif AAA (2015) Image encryption scheme for secure digital images based on 3D cat map and turing machine. In: 2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR). IEEE, pp 230–234 – reference: HussainIShahTGondalMAA novel approach for designing substitution-boxes based on nonlinear chaotic algorithmNonlinear Dyn2012703179117942992175 – reference: ZaghloulAZhangTHouHAminMEl-LatifAAAEl-WahabMSAA block encryption scheme for secure still visual data based on one-way coupled map latticeInt J Sec Appl20148489100 – reference: Manjula G, Mohan H (2016) Constructing key dependent dynamic S-Box for AES block cipher system. In: 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, pp 613–617 – reference: Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media – reference: Al SolamiEAhmadMVolosCDojaMBegMA new hyperchaotic system-based design for efficient bijective substitution-boxesEntropy2018207525 – reference: BarthelemyPBertolottiJWiersmaDSA Lévy flight for lightNature20084537194495498 – reference: El-Latif AAA, Li L, Wang N, Li Q, Niu X A (2012) new image encryption based on chaotic systems and singular value decomposition. In: Fourth International Conference on Digital Image Processing (ICDIP 2012). International Society for Optics and Photonics, p 83343F – reference: Webster A, Tavares SE (1985) On the design of S-boxes. Conf Theory Appl Cryptograph Tech:523–534 – reference: OuaarabAAhiodBYangX-SDiscrete cuckoo search algorithm for the travelling salesman problemNeural Comput & Applic2014247–816591669 – reference: Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press – reference: ul IslamFLiuGDesigning S-Box Based on 4D-4Wing Hyperchaotic System3D Res2017819 – reference: Carlet C (2005) On highly nonlinear S-boxes and their inability to thwart DPA attacks. In: INDOCRYPT. Springer, pp 49–62 – reference: El-LatifAAALiLNiuXA new image encryption scheme based on cyclic elliptic curve and chaotic systemMultimed Tools Appl201470315591584 – reference: Belazi A, El-Latif AAA, Rhouma R, Belghith S (2015) Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, pp 606–610 – reference: Yang X-S, Deb S (2009) Cuckoo search via Lévy flights. In: Nature & Biologically Inspired Computing. NaBIC 2009. World congress on, 2009. IEEE, pp 210–214 – reference: Ahmad M, Ahmad F, Nasim Z, Bano Z, Zafar S (2015) Designing chaos based strong substitution box. Paper presented at the eighth international conference on contemporary computing (IC3) (2015) – reference: ZhangTChenCPChenLXuXHuBDesign of highly nonlinear substitution boxes based on I-Ching operatorsIEEE Trans Cybernet2018481233493358 – reference: KhanMShahTMahmoodHGondalMAHussainIA novel technique for the construction of strong S-boxes based on chaotic Lorenz systemsNonlinear Dyn2012703230323112992216 – reference: KhanMShahTAn efficient construction of substitution box with fractional chaotic systemSIViP201596133513383351826 – reference: BenrhoumaOHermassiHEl-LatifAAABelghithSCryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domainSIViP20159612811286 – reference: TianYLuZS-box: six-dimensional compound hyperchaotic map and artificial bee colony algorithmJ Syst Eng Electron2016271232241 – reference: Carlet C (2008) On the higher order nonlinearities of Boolean functions and S-boxes, and their generalizations. In: International Conference on Sequences and Their Applications. Springer, pp 345–367 – reference: ChenGA novel heuristic method for obtaining S-boxesChaos, Solitons Fractals20083641028103623793681131.94012 – reference: ReynoldsAMFryeMAFree-flight odor tracking in Drosophila is consistent with an optimal intermittent scale-free searchPLoS One200724 – reference: IvanovGNikolovNNikovaSReversed genetic algorithms for generation of bijective s-boxes with good cryptographic propertiesCryptogr Commun20168224727634882191338.94074 – reference: WangYWongK-WLiCLiYA novel method to design S-box based on chaotic map and genetic algorithmPhys Lett A201237668278331255.81165 – reference: ShannonCECommunication theory of secrecy systemsBell Labs Tech J1949284656715321331200.94005 – reference: Matsui M (1993) Linear cryptanalysis method for DES cipher. Workshop Theory Appl Cryptograph Techn 386–397 – reference: BihamEShamirADifferential cryptanalysis of DES-like cryptosystemsJ Cryptol19914137212027860729.68017 – reference: PieprzykJFinkelsteinGTowards effective nonlinear cryptosystem designIEE Proc E-Comput Digit Tech19881356325335 – reference: CuiLCaoYA new S-box structure named affine-power-affineInt J Innov Comput, Inform Control200733751759 – reference: MurphySRobshawMJBKey-dependent S-boxes and differential cryptanalysisDes Codes Crypt200227322925519284401022.94011 – reference: Peng J, El-Latif AAA, Belazi A, Kotulski Z (2017) Efficient chaotic nonlinear component for secure cryptosystems. In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, pp 989–993 – reference: KhanMAsgharZA novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutationNeural Comput & Applic2018294993999 – reference: Ahmad M, Seeru F, Siddiqi AM, Masood S (2018) Dynamic 9× 9 substitution-boxes using Chaos-based heuristic search. In: soft computing: theories and applications. Springer, pp 839-851 – reference: ZhangTEl-FatyanyALiLAminMEl-LatifAAASecret sharing-based chaotic image encryptionInt J Sec Appl201597217224 – reference: ÖzkaynakFÖzerABA method for designing strong S-boxes based on chaotic Lorenz systemPhys Lett A201037436373337381238.34085 – reference: HuangLDingSYuSWangJLuKChaos-enhanced cuckoo search optimization algorithms for global optimizationAppl Math Model2016405–638603875346122707159597 – reference: YangX-SDebSEngineering optimisation by cuckoo searchInt J Math Model Num Optim2010143303431279.90204 – reference: TangGLiaoXChenYA novel method for designing S-boxes based on chaotic mapsChaos, Solitons Fractals20052324134191068.94017 – reference: KhanMShahTGondalMAAn efficient technique for the construction of substitution box with chaotic partial differential equationNonlinear Dyn2013733179518013083821 – reference: AhmadMBhatiaDHassanYA novel ant colony optimization based scheme for substitution box designProc Comput Sci201557572580 – reference: Mohanty PK, Parhi DR (2013) Cuckoo search algorithm for the mobile robot navigation. In: International Conference on Swarm, Evolutionary, and Memetic Computing. Springer, pp 527–536 – reference: ÇavuşoğluÜZenginAPehlivanIKaçarSA novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang systemNonlinear Dyn2017872108110941373.68212 – reference: El-LatifAAALiLWangNPengJ-LShiZ-FNiuXA new image encryption scheme for secure digital images based on combination of polynomial chaotic mapsRes J Appl Sci Eng Technol201244322328 – reference: LambićDA new discrete chaotic map based on the composition of permutationsChaos, Solitons Fractals20157824524833942441353.37031 – reference: LambićDA novel method of S-box design based on discrete chaotic mapNonlinear Dyn2017874240724133608831 – reference: Rodrigues D, Pereira LA, Almeida T, Papa JP, Souza A, Ramos CC, Yang X-S BCS (2013) A binary cuckoo search algorithm for feature selection. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on. IEEE, pp 465–468 – reference: Hussain I, Shah T, Gondal MA (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dynamics: 1–4 – reference: JamalSSKhanMUShahTA watermarking technique with chaotic fractional S-box transformationWirel Pers Commun201690420332049 – reference: Payne RB, Sorensen MD (2005) The cuckoos, vol 15. Oxford University Press, – reference: BaronchelliARadicchiFLévy flights in human behavior and cognitionChaos, Solitons Fractals201356101105 – reference: KanagarajGPonnambalamSJawaharNA hybrid cuckoo search and genetic algorithm for reliability–redundancy allocation problemsComput Ind Eng201366411151124 – reference: KazakevičiusRRuseckasJLévy flights in inhomogeneous environments and 1/f noisePhys A: Stat Mech Appl2014411951031395.82190 – reference: LambićDA novel method of S-box design based on chaotic map and composition methodChaos, Solitons Fractals20145816211348.94064 – reference: ShehabMKhaderATAl-BetarMAA survey on applications and variants of the cuckoo search algorithmAppl Soft Comput20176110411059 – reference: AlhadawiHSZolkipliMFIsmailSMLambićDDesigning a pseudorandom bit generator based on LFSRs and a discrete chaotic mapCryptologia2019433190211 – reference: PavlyukevichILévy flights, non-local search and simulated annealingJ Comput Phys200722621830184423563961125.65009 – reference: ÖzkaynakFÇelikVÖzerABA new S-box construction method based on the fractional-order chaotic Chen systemSIViP2017114659664 – reference: TianYLuZChaotic S-box: intertwining logistic map and bacterial foraging optimizationMath Probl Eng2017201711137297191426.94127 – reference: BelaziAKhanMEl-LatifAAABelghithSEfficient cryptosystem approaches: S-boxes and permutation–substitution-based encryptionNonlinear Dyn2017871337361 – reference: BelaziAEl-LatifAAABelghithSA novel image encryption scheme based on substitution-permutation network and chaosSignal Process2016128155170 – reference: Dawson M, Tavares SE (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Workshop Theory Appl Cryptograph Techn 352–367 – reference: El-Latif AAA, Li L, Wang N, Niu X (2011) Image encryption scheme of pixel bit based on combination of chaotic systems. In: 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, pp 369–373 – reference: FarahTRhoumaRBelghithSA novel method for designing S-box based on chaotic map and teaching–learning-based optimizationNonlinear Dyn201788210591074 – reference: ÖzkaynakFYavuzSDesigning chaotic S-boxes based on time-delay chaotic systemNonlinear Dyn201374355155731176411344.94069 – reference: WangG-GDebSGandomiAHZhangZAlaviAHChaotic cuckoo searchSoft Comput201620933493362 – reference: AlzaidiAAAhmadMDojaMNAl SolamiEBegMSA new 1D chaotic map and $\beta $-hill climbing for generating substitution-boxesIEEE Access201865540555418 – reference: KhanMShahTBatoolSIConstruction of S-box based on chaotic Boolean functions and its application in image encryptionNeural Comput & Applic2016273677685 – reference: Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. Int Conf Elect Comm Bus Intel 125–128 – reference: ZahidAHArshadMJAhmadMA novel construction of efficient substitution-boxes using cubic fractional transformationEntropy20192132453943228 – reference: AhmedHAZolkipliMFAhmadMA novel efficient substitution-box design based on firefly algorithm and discrete chaotic mapNeural Comput & Applic2018317201721010.1007/s00521-018-3557-3 – reference: LehmerDHTeaching combinatorial tricks to a computerProc Sympos Appl Math Combinatorial Anal1960101791931132890096.00504 – reference: ShlesingerMFMathematical physics: search researchNature20064437109281282 – reference: BrownCTLiebovitchLSGlendonRLévy flights in Dobe Ju/‘hoansi foraging patternsHum Ecol2007351129138 – reference: Yang X-S (2013) Bat algorithm and cuckoo search: a tutorial. In: Artificial Intelligence, Evolutionary Computing and Metaheuristics. Springer, pp. 421–434 – reference: BelaziAEl-LatifAAAA simple yet efficient S-box method based on chaotic sine mapOptik201713014381444 – reference: LiuGYangWLiuWDaiYDesigning S-boxes based on 3-D four-wing autonomous chaotic systemNonlinear Dyn20158241867187734229861441.94086 – reference: Özkaynak F (2017) Construction of robust substitution boxes based on chaotic systems. Neural Comput Appl 1–10 – reference: JakimoskiGKocarevLChaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Trans Circ Syst I: Fund Theory Appl200148216316918205410998.94016 – reference: Picek S, Marchiori E, Batina L, Jakobovic D (2014) Combining evolutionary computation and algebraic constructions to find cryptography-relevant Boolean functions. In: International Conference on Parallel Problem Solving from Nature. Springer, pp 822–831 – volume: 4 start-page: 3 issue: 1 year: 1991 ident: 10048_CR15 publication-title: J Cryptol doi: 10.1007/BF00630563 – volume: 411 start-page: 95 year: 2014 ident: 10048_CR36 publication-title: Phys A: Stat Mech Appl doi: 10.1016/j.physa.2014.06.020 – volume: 8 start-page: 9 issue: 1 year: 2017 ident: 10048_CR71 publication-title: 3D Res doi: 10.1007/s13319-017-0119-x – volume: 36 start-page: 1028 issue: 4 year: 2008 ident: 10048_CR20 publication-title: Chaos, Solitons Fractals doi: 10.1016/j.chaos.2006.08.003 – volume: 2017 start-page: 1 year: 2017 ident: 10048_CR70 publication-title: Math Probl Eng – ident: 10048_CR51 doi: 10.1007/978-3-319-03753-0_47 – ident: 10048_CR22 – ident: 10048_CR48 doi: 10.1007/3-540-48285-7_33 – volume: 31 start-page: 7201 year: 2018 ident: 10048_CR4 publication-title: Neural Comput & Applic doi: 10.1007/s00521-018-3557-3 – volume: 56 start-page: 101 year: 2013 ident: 10048_CR8 publication-title: Chaos, Solitons Fractals doi: 10.1016/j.chaos.2013.07.013 – volume: 87 start-page: 2407 issue: 4 year: 2017 ident: 10048_CR44 publication-title: Nonlinear Dyn doi: 10.1007/s11071-016-3199-x – ident: 10048_CR26 – volume: 40 start-page: 3860 issue: 5–6 year: 2016 ident: 10048_CR29 publication-title: Appl Math Model doi: 10.1016/j.apm.2015.10.052 – ident: 10048_CR1 doi: 10.1109/IC3.2015.7346660 – volume: 29 start-page: 993 issue: 4 year: 2018 ident: 10048_CR37 publication-title: Neural Comput & Applic doi: 10.1007/s00521-016-2511-5 – volume: 58 start-page: 16 year: 2014 ident: 10048_CR42 publication-title: Chaos, Solitons Fractals doi: 10.1016/j.chaos.2013.11.001 – volume: 82 start-page: 1867 issue: 4 year: 2015 ident: 10048_CR46 publication-title: Nonlinear Dyn doi: 10.1007/s11071-015-2283-y – ident: 10048_CR49 – ident: 10048_CR50 doi: 10.1109/SOCPAR.2015.7492812 – ident: 10048_CR17 doi: 10.1007/11596219_5 – volume: 61 start-page: 1041 year: 2017 ident: 10048_CR66 publication-title: Appl Soft Comput doi: 10.1016/j.asoc.2017.02.034 – ident: 10048_CR76 doi: 10.1007/978-3-642-29694-9_17 – volume: 1 start-page: 330 issue: 4 year: 2010 ident: 10048_CR78 publication-title: Int J Math Model Num Optim – volume: 128 start-page: 155 year: 2016 ident: 10048_CR12 publication-title: Signal Process doi: 10.1016/j.sigpro.2016.03.021 – volume: 74 start-page: 551 issue: 3 year: 2013 ident: 10048_CR56 publication-title: Nonlinear Dyn doi: 10.1007/s11071-013-0987-4 – volume: 226 start-page: 1830 issue: 2 year: 2007 ident: 10048_CR58 publication-title: J Comput Phys doi: 10.1016/j.jcp.2007.06.008 – volume: 73 start-page: 1795 issue: 3 year: 2013 ident: 10048_CR40 publication-title: Nonlinear Dyn doi: 10.1007/s11071-013-0904-x – ident: 10048_CR11 doi: 10.1109/IWCMC.2015.7289152 – volume: 24 start-page: 1659 issue: 7–8 year: 2014 ident: 10048_CR53 publication-title: Neural Comput & Applic doi: 10.1007/s00521-013-1402-2 – volume: 6 start-page: 55405 year: 2018 ident: 10048_CR7 publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2871557 – volume: 70 start-page: 1791 issue: 3 year: 2012 ident: 10048_CR31 publication-title: Nonlinear Dyn doi: 10.1007/s11071-012-0573-1 – volume: 23 start-page: 413 issue: 2 year: 2005 ident: 10048_CR68 publication-title: Chaos, Solitons Fractals doi: 10.1016/j.chaos.2004.04.023 – volume: 8 start-page: 247 issue: 2 year: 2016 ident: 10048_CR32 publication-title: Cryptogr Commun doi: 10.1007/s12095-015-0170-5 – ident: 10048_CR64 doi: 10.1109/ISCAS.2013.6571881 – ident: 10048_CR72 doi: 10.1109/ECBI.2009.15 – volume: 11 start-page: 659 issue: 4 year: 2017 ident: 10048_CR57 publication-title: SIViP doi: 10.1007/s11760-016-1007-1 – volume: 27 start-page: 229 issue: 3 year: 2002 ident: 10048_CR52 publication-title: Des Codes Crypt doi: 10.1023/A:1019991004496 – ident: 10048_CR24 doi: 10.1109/IIHMSP.2011.67 – volume: 88 start-page: 1059 issue: 2 year: 2017 ident: 10048_CR28 publication-title: Nonlinear Dyn doi: 10.1007/s11071-016-3295-y – volume: 43 start-page: 190 issue: 3 year: 2019 ident: 10048_CR6 publication-title: Cryptologia doi: 10.1080/01611194.2018.1548390 – volume: 130 start-page: 1438 year: 2017 ident: 10048_CR10 publication-title: Optik doi: 10.1016/j.ijleo.2016.11.152 – ident: 10048_CR77 doi: 10.1109/NABIC.2009.5393690 – ident: 10048_CR23 doi: 10.1007/3-540-46416-6_30 – ident: 10048_CR47 doi: 10.1109/ICATCCT.2016.7912073 – volume: 4 start-page: 322 issue: 4 year: 2012 ident: 10048_CR25 publication-title: Res J Appl Sci Eng Technol – ident: 10048_CR59 doi: 10.1093/oso/9780198502135.003.0003 – volume: 87 start-page: 337 issue: 1 year: 2017 ident: 10048_CR13 publication-title: Nonlinear Dyn doi: 10.1007/s11071-016-3046-0 – ident: 10048_CR30 doi: 10.1007/s11071-012-0573-1 – volume: 78 start-page: 245 year: 2015 ident: 10048_CR43 publication-title: Chaos, Solitons Fractals doi: 10.1016/j.chaos.2015.08.001 – volume: 374 start-page: 3733 issue: 36 year: 2010 ident: 10048_CR55 publication-title: Phys Lett A doi: 10.1016/j.physleta.2010.07.019 – volume: 135 start-page: 325 issue: 6 year: 1988 ident: 10048_CR62 publication-title: IEE Proc E-Comput Digit Tech doi: 10.1049/ip-e.1988.0044 – ident: 10048_CR60 doi: 10.1109/ICUFN.2017.7993947 – volume: 27 start-page: 232 issue: 1 year: 2016 ident: 10048_CR69 publication-title: J Syst Eng Electron – volume: 70 start-page: 2303 issue: 3 year: 2012 ident: 10048_CR39 publication-title: Nonlinear Dyn doi: 10.1007/s11071-012-0621-x – volume: 9 start-page: 1335 issue: 6 year: 2015 ident: 10048_CR38 publication-title: SIViP doi: 10.1007/s11760-013-0577-4 – ident: 10048_CR3 doi: 10.1007/978-981-10-5687-1_75 – volume: 3 start-page: 751 issue: 3 year: 2007 ident: 10048_CR21 publication-title: Int J Innov Comput, Inform Control – volume: 2 issue: 4 year: 2007 ident: 10048_CR63 publication-title: PLoS One doi: 10.1371/journal.pone.0000354 – volume: 66 start-page: 1115 issue: 4 year: 2013 ident: 10048_CR35 publication-title: Comput Ind Eng doi: 10.1016/j.cie.2013.08.003 – volume: 28 start-page: 656 issue: 4 year: 1949 ident: 10048_CR65 publication-title: Bell Labs Tech J doi: 10.1002/j.1538-7305.1949.tb00928.x – volume: 57 start-page: 572 year: 2015 ident: 10048_CR2 publication-title: Proc Comput Sci doi: 10.1016/j.procs.2015.07.394 – volume: 8 start-page: 89 issue: 4 year: 2014 ident: 10048_CR79 publication-title: Int J Sec Appl – volume: 87 start-page: 1081 issue: 2 year: 2017 ident: 10048_CR19 publication-title: Nonlinear Dyn doi: 10.1007/s11071-016-3099-0 – volume: 10 start-page: 179 year: 1960 ident: 10048_CR45 publication-title: Proc Sympos Appl Math Combinatorial Anal doi: 10.1090/psapm/010/0113289 – ident: 10048_CR54 doi: 10.1007/s00521-017-3287-y – ident: 10048_CR75 doi: 10.1007/3-540-39799-X_41 – volume: 21 start-page: 245 issue: 3 year: 2019 ident: 10048_CR80 publication-title: Entropy doi: 10.3390/e21030245 – volume: 48 start-page: 163 issue: 2 year: 2001 ident: 10048_CR33 publication-title: IEEE Trans Circ Syst I: Fund Theory Appl doi: 10.1109/81.904880 – volume: 20 start-page: 525 issue: 7 year: 2018 ident: 10048_CR5 publication-title: Entropy doi: 10.3390/e20070525 – ident: 10048_CR18 doi: 10.1007/978-3-540-85912-3_31 – ident: 10048_CR61 doi: 10.1007/978-3-319-10762-2_81 – volume: 376 start-page: 827 issue: 6 year: 2012 ident: 10048_CR73 publication-title: Phys Lett A doi: 10.1016/j.physleta.2012.01.009 – volume: 35 start-page: 129 issue: 1 year: 2007 ident: 10048_CR16 publication-title: Hum Ecol doi: 10.1007/s10745-006-9083-4 – volume: 443 start-page: 281 issue: 7109 year: 2006 ident: 10048_CR67 publication-title: Nature doi: 10.1038/443281a – volume: 48 start-page: 3349 issue: 12 year: 2018 ident: 10048_CR82 publication-title: IEEE Trans Cybernet doi: 10.1109/TCYB.2018.2846186 – volume: 9 start-page: 217 issue: 7 year: 2015 ident: 10048_CR81 publication-title: Int J Sec Appl – volume: 27 start-page: 677 issue: 3 year: 2016 ident: 10048_CR41 publication-title: Neural Comput & Applic doi: 10.1007/s00521-015-1887-y – volume: 453 start-page: 495 issue: 7194 year: 2008 ident: 10048_CR9 publication-title: Nature doi: 10.1038/nature06948 – volume: 90 start-page: 2033 issue: 4 year: 2016 ident: 10048_CR34 publication-title: Wirel Pers Commun doi: 10.1007/s11277-016-3436-0 – volume: 9 start-page: 1281 issue: 6 year: 2015 ident: 10048_CR14 publication-title: SIViP doi: 10.1007/s11760-013-0570-y – volume: 20 start-page: 3349 issue: 9 year: 2016 ident: 10048_CR74 publication-title: Soft Comput doi: 10.1007/s00500-015-1726-1 – volume: 70 start-page: 1559 issue: 3 year: 2014 ident: 10048_CR27 publication-title: Multimed Tools Appl doi: 10.1007/s11042-012-1173-2 |
SSID | ssj0016524 |
Score | 2.5306726 |
Snippet | Substitution-boxes (S-boxes) are unique nonlinear elements, which are used to achieve the property of confusion in modern symmetric ciphers and offer... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 7333 |
SubjectTerms | Boxes Computer Communication Networks Computer Science Criteria Cryptography Data Structures and Information Theory Encryption Heuristic methods Multimedia Information Systems Nonlinearity Performance evaluation Search algorithms Special Purpose and Application-Based Systems |
SummonAdditionalLinks | – databaseName: SpringerLink Journals (ICM) dbid: U2A link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDI5gXODAY4AYDJQDN4jUpK_0OCGmCQkuMGmcKjdJGWK009Yhfj5Jmm6AAIlrm6aSHcefZfszQuc8YzKT4BMeAJCAiYCAFEB0POTJJGaRbymFbu-iwTC4GYUj1xQ2b6rdm5SkvalXzW7UtJKYcMewnHHC19FGaGJ3fYqHrLfMHUShG2XLPaL9IXWtMj_v8dUdrTDmt7So9Tb9XbTtYCLu1XrdQ2uqaKOdZgQDdhbZRluf-AT30WMPF-WbmuB6LjQuc3xPsvIdS1ungY3L0k8LbHpxZxouYzGGUv8Cv8J0jqGQWCzES1ni2gAwTJ7K2XM1fj1Aw_71w9WAuNkJRPhRXBEVKemLLNHOR8XatHLDQxZz4DSUGQVQyuNAWZ54yiRKFafgMRGyOEkCRiPlH6JWURbqCGGqGDc4UUcmEADLuQYtodB7Q27zqh1EGxGmwhGLm_kWk3RFiWzEnmqxp1bsKe-gi-U305pW48_V3UYzqTOxeWqoDvVloiFUB1022lq9_n234_8tP0GbzNSx2ErtLmpVs4U61UCkys7sufsAxYDQ1A priority: 102 providerName: Springer Nature |
Title | A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm |
URI | https://link.springer.com/article/10.1007/s11042-020-10048-8 https://www.proquest.com/docview/2492794065 |
Volume | 80 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT-MwEB4BvbAH3iu6QOUDt12L2HnUPaGCWhAItIKtBKdoYjsgUZIuLav9-YwThwISXJ3EkcYez4xn5vsA9lUmTWYw5CpC5JHUEUejkVM8FJheVyZhBSl0cZmcjqKzm_jGX7hNfVllcyZWB7UptbsjP3DIdrR3yGIeTv5yxxrlsqueQmMRWnQEKwq-WkeDy99Xr3mEJPa0tirgZBuFb5upm-eEa01x4ZNDTVNcvTdNc3_zQ4q0sjzDNVjxLiPr12u8Dgu22IDVho6Bee3cgG9vsAU34bbPivKfHbOaI5qVObvmWfmfmapmgznzRaMFc325T-Q6M32PJf2CPeJkyrAwTD_rh7JktTIwHN-RPGb3j1swGg7-HJ9yz6PAdZh0Z9wm1oQ665Ehsl1Ss9xhknUVKhGbTCBaGygUMu8F1iVNrRIYSB2TuHuRFIkNv8NSURZ2G5iwUjmfkaIUjFDmihyYWNPcmFc51jaIRoSp9iDjjutinM7hkZ3YUxJ7Wok9VW34-frNpIbY-PLt3WZlUq9u03S-Odrwq1mt-ePPZ_vx9Ww7sCxdDUtVpb0LS7OnZ7tHTsgs68CiGp50oNU_uT0fdPy-o9GR7L8AvIzY2g |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTxRBEK4gHJSDKGpYBa2DnrTjdM9jew7EEHRd5HEREjyNPd09krDMLOwi8Kf8jVTNg0UTuXGdma5OqqvrMVX1FcBbnSuXOxMKHRkjImUjYZw1guKhwKV9lYQ1pNDuXjI8iL4dxodz8KfrheGyyk4n1oraVZb_kX9kZDuSHbKYn8angqdGcXa1G6HRiMW2v7qgkG2yvvWZzvedUoMv-5tD0U4VEDZM-lPhE-9Cm6ekln2fhK5ghK6-NlrGLpfGeB9oI1WRBp5TiF5LEygb0-ZppGTiQ6L7ABaiMEz5RunB15usRRK3Q3R1IMgSy7ZJp2nVk9wIw8EaY7Rpof82hDPv9p-EbG3nBk_gceug4kYjUU9hzpfLsNQNf8BWFyzD4i0kw2fwYwPL6rcfYTORGqsCv4u8ukRXV4ggG0t6WiJ3AZ-Ro472yFS0BZ6Y8QRN6dCe2-OqwobHaEa_iPvTo5PncHAv_H0B82VV-hVA6ZVmD5ViIhMZVWhyl2JLtE1RZ3R7IDsWZraFNOfJGqNsBsbMbM-I7VnN9kz34P3NmnED6HHn16vdyWTt5Z5kM1HswYfutGav_0_t5d3U3sDD4f7uTraztbf9Ch4prp6p68NXYX56du7XyP2Z5q9rmUP4ed9Cfg33jBAW |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9RADLbKVkJw4FFALBTwAU4wambymj0gVGhXLYVVBVQqp-DMTKjENlm6Wx5_jV-HJ5l0AYnees3DiTxfxnZsfwZ4rEtlS0ux0AmRSJRJBFlDguOhyI5ylcUtpdDbSbZzkLw-TA9X4FffC-PLKvs9sd2obWP8P_INz2zH2GGLuVGFsoj9rfGL2VfhJ0j5TGs_TqODyJ77-Z3Dt_nz3S1e6ydKjbc_vNoRYcKAMHGWL4TLnI1NOeIt2uUMwMqzdeWatExtKYmcizRJVY0i59OJTkuKlEn5RUaJkpmLWe4lWM05KooGsPpye7L_7iyHkaVhpK6OBNtlGVp2usY96dtifOjmGdu00H-bxaWv-096trV64xtwLbiruNnh6yasuHoNrvejIDDsDGtw9Q9ew1vwcRPr5pubYjefGpsK34uy-YG2rRdBbzr5aI2-J_iE3XY0R9TwI_CYZnOk2qI5NV-aBjstI00_s_4XR8e34eBCNHwHBnVTu7uA0int_VWOkCghVWl2nlLDsqlq87tDkL0KCxMIzv2cjWmxpGb2ai9Y7UWr9kIP4enZPbOO3uPcq9f7lSnCpz4vlsAcwrN-tZan_y_t3vnSHsFlBnjxZneydx-uKF9K0xaLr8NgcXLqHrAvtCgfBtAhfLponP8GgHMVqA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+method+of+S-box+design+based+on+discrete+chaotic+maps+and+cuckoo+search+algorithm&rft.jtitle=Multimedia+tools+and+applications&rft.au=Alhadawi%2C+Hussam+S&rft.au=Majid%2C+Mazlina+Abdul&rft.au=Lambi%C4%87+Dragan&rft.au=Musheer%2C+Ahmad&rft.date=2021-02-01&rft.pub=Springer+Nature+B.V&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=80&rft.issue=5&rft.spage=7333&rft.epage=7350&rft_id=info:doi/10.1007%2Fs11042-020-10048-8&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |