A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups
The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim...
Saved in:
Published in | IEEE access Vol. 8; pp. 75473 - 75490 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim to fulfill the mentioned requirement of robustness, a novel group theoretic and graphical method is proposed to construct S-box with optimal features. Firstly, a strong S-box is generated with the help of orbits of coset graphs and the action of proposed powerful permutation of symmetric group <inline-formula> <tex-math notation="LaTeX">S_{256} </tex-math></inline-formula>. In addition, a specific group is designed the action of whose pairs of permutations has the ability to generate as many as 462422016 strong S-boxes. Few of such proposed S-boxes are reported and assessed against standard performance parameters to validate the effectiveness of proposed findings. The features of proposed S-boxes are compared with most of the recent S-boxes to validate the superior performance. Moreover, they are also applied for image encryption to demonstrate their suitability for multimedia security applications. |
---|---|
AbstractList | The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim to fulfill the mentioned requirement of robustness, a novel group theoretic and graphical method is proposed to construct S-box with optimal features. Firstly, a strong S-box is generated with the help of orbits of coset graphs and the action of proposed powerful permutation of symmetric group <inline-formula> <tex-math notation="LaTeX">S_{256} </tex-math></inline-formula>. In addition, a specific group is designed the action of whose pairs of permutations has the ability to generate as many as 462422016 strong S-boxes. Few of such proposed S-boxes are reported and assessed against standard performance parameters to validate the effectiveness of proposed findings. The features of proposed S-boxes are compared with most of the recent S-boxes to validate the superior performance. Moreover, they are also applied for image encryption to demonstrate their suitability for multimedia security applications. The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness of cryptosystem against linear and differential cryptanalyses. With an aim to fulfill the mentioned requirement of robustness, a novel group theoretic and graphical method is proposed to construct S-box with optimal features. Firstly, a strong S-box is generated with the help of orbits of coset graphs and the action of proposed powerful permutation of symmetric group S256. In addition, a specific group is designed the action of whose pairs of permutations has the ability to generate as many as 462422016 strong S-boxes. Few of such proposed S-boxes are reported and assessed against standard performance parameters to validate the effectiveness of proposed findings. The features of proposed S-boxes are compared with most of the recent S-boxes to validate the superior performance. Moreover, they are also applied for image encryption to demonstrate their suitability for multimedia security applications. |
Author | Ahmad, Musheer Yousaf, Muhammad Awais Alolaiyan, Hanan Aslam, Waqar Razaq, Abdul Alawida, Moatsum Shuaib, Umer |
Author_xml | – sequence: 1 givenname: Abdul orcidid: 0000-0002-1898-4082 surname: Razaq fullname: Razaq, Abdul organization: Department of Mathematics, Division of Science and Technology, University of Education, Lahore, Pakistan – sequence: 2 givenname: Hanan orcidid: 0000-0002-7845-7751 surname: Alolaiyan fullname: Alolaiyan, Hanan organization: Department of Mathematics, King Saud University, Riyadh, Saudi Arabia – sequence: 3 givenname: Musheer orcidid: 0000-0002-4915-9325 surname: Ahmad fullname: Ahmad, Musheer email: musheer.cse@gmail.com organization: Department of Computer Engineering, Jamia Millia Islamia, New Delhi, India – sequence: 4 givenname: Muhammad Awais orcidid: 0000-0002-3507-9367 surname: Yousaf fullname: Yousaf, Muhammad Awais organization: Department of Mathematics, The Islamia University of Bahawalpur, Bahawalpur, Pakistan – sequence: 5 givenname: Umer orcidid: 0000-0002-8979-0816 surname: Shuaib fullname: Shuaib, Umer organization: Department of Mathematics, Government College University Faisalabad, Faisalabad, Pakistan – sequence: 6 givenname: Waqar orcidid: 0000-0002-8780-0240 surname: Aslam fullname: Aslam, Waqar organization: Department of Computer Science and Information Technology, The Islamia University of Bahawalpur, Bahawalpur, Pakistan – sequence: 7 givenname: Moatsum orcidid: 0000-0001-8146-5843 surname: Alawida fullname: Alawida, Moatsum organization: School of Computer Sciences, Universiti Sains Malaysia, Minden, Malaysia |
BookMark | eNpNUclOwzAQtRBIbP2CXixxTvGa5VgiKEgsh8DZcuMxpGrjYjsI_h6HIMRcZvT0lpHeKTrsXQ8IzSlZUEqqy2VdXzfNghFGFqwqq7zID9AJo3mVccnzw3_3MZqFsCFpygTJ4gTBEj-6D9jiB4hvzmDrPF5BD17HzvXYWdxE7_pX3AzrELs4jHB25T4h4CsdwODEql2AiFde798C1r3BzdduB9F3bQLdsA_n6MjqbYDZ7z5DLzfXz_Vtdv-0uquX91krSBkzW-qW5oLYQoIu121huNQWhCkZo8A4aSmI3ApSUA7r1mpJtAAhmRE58MLyM3Q3-RqnN2rvu532X8rpTv0Azr8q7WPXbkGtR6WWlBsjBRvPFJuSCkok40Ymr4vJa-_d-wAhqo0bfJ_eV0xIQSpGaJlYfGK13oXgwf6lUqLGetRUjxrrUb_1JNV8UnUA8KeoSJETUfFvLD2NDw |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1016_j_ins_2021_01_014 crossref_primary_10_1109_ACCESS_2021_3052161 crossref_primary_10_1371_journal_pone_0241890 crossref_primary_10_1109_ACCESS_2022_3218643 crossref_primary_10_1007_s11042_023_17399_y crossref_primary_10_1109_ACCESS_2021_3086717 crossref_primary_10_1007_s13369_021_05666_9 crossref_primary_10_1109_ACCESS_2020_3004449 crossref_primary_10_1109_ACCESS_2022_3209202 crossref_primary_10_1109_ACCESS_2023_3337443 crossref_primary_10_1007_s11277_020_07841_x crossref_primary_10_1007_s13369_022_06651_6 crossref_primary_10_32604_cmc_2022_023685 crossref_primary_10_1007_s11042_023_15971_0 crossref_primary_10_1007_s13369_024_09099_y crossref_primary_10_1016_j_jksuci_2023_03_004 crossref_primary_10_1109_ACCESS_2020_3034832 crossref_primary_10_3390_sym12111896 crossref_primary_10_1007_s40314_023_02545_x crossref_primary_10_1109_ACCESS_2021_3095618 crossref_primary_10_1109_ACCESS_2020_3016401 crossref_primary_10_1109_ACCESS_2020_3045260 crossref_primary_10_1109_ACCESS_2022_3143096 crossref_primary_10_1109_ACCESS_2022_3183990 crossref_primary_10_1007_s11042_021_11635_z crossref_primary_10_1016_j_matcom_2023_01_036 crossref_primary_10_1007_s11760_024_03301_2 crossref_primary_10_1109_ACCESS_2021_3077194 crossref_primary_10_1007_s11071_022_07956_9 crossref_primary_10_1007_s11265_022_01744_9 crossref_primary_10_1007_s11277_021_08981_4 crossref_primary_10_1109_ACCESS_2021_3049881 crossref_primary_10_32604_cmc_2022_028272 crossref_primary_10_1016_j_measen_2023_100923 crossref_primary_10_1016_j_eswa_2023_122779 crossref_primary_10_1109_ACCESS_2020_3001868 crossref_primary_10_3390_math11102322 crossref_primary_10_1007_s11042_022_11898_0 crossref_primary_10_1016_j_vlsi_2023_06_004 crossref_primary_10_1155_2023_5767102 crossref_primary_10_1007_s11042_023_14910_3 crossref_primary_10_3390_e22070717 crossref_primary_10_1109_ACCESS_2021_3092512 crossref_primary_10_1109_ACCESS_2021_3113338 crossref_primary_10_1109_ACCESS_2021_3093247 crossref_primary_10_1155_2022_6320243 crossref_primary_10_32604_cmc_2022_021019 |
Cites_doi | 10.1049/ip-e.1988.0044 10.1007/s00521-018-3557-3 10.1109/AICCSA.2014.7073265 10.1007/978-3-642-80350-5_30 10.1007/s11071-018-4478-5 10.1007/s11071-017-3409-1 10.15388/Informatica.2009.235 10.1109/TCYB.2018.2846186 10.1007/978-3-642-04101-3 10.1007/s10773-019-04188-3 10.1016/j.pisc.2016.06.001 10.1007/s00521-015-1887-y 10.1007/s11071-016-3199-x 10.1016/j.amc.2018.03.019 10.1007/s11042-019-08464-6 10.1007/978-3-540-30539-2_6 10.1007/s10773-019-04254-w 10.1016/j.camwa.2012.05.017 10.1080/1023697X.2012.10669006 10.1007/s11277-020-07052-4 10.1155/2017/6969312 10.1109/81.904880 10.1007/s11277-017-5054-x 10.1007/s00521-017-3287-y 10.1109/ACCESS.2019.2956385 10.1007/3-540-39799-X_41 10.1142/S021812749800098X 10.1109/TCSI.2001.972857 10.1504/IJCNDS.2014.057991 10.1007/s11071-016-3295-y 10.3390/e21101004 10.1109/ACCESS.2020.2970806 10.3390/e21030245 10.1109/ACCESS.2019.2911395 10.1109/ICUMT.2012.6459712 10.1007/s11071-012-0675-9 10.1016/j.ijleo.2015.11.221 10.1007/s11277-018-5787-1 10.1109/ACCESS.2019.2906222 10.1109/ACCESS.2020.2973679 10.1080/01611190802653228 10.1109/ACCESS.2020.2975880 10.1109/ACCESS.2018.2871557 10.1016/j.ins.2012.02.030 10.1007/s11071-016-3046-0 10.3390/e20070525 10.1016/j.chaos.2013.11.001 10.1109/7384.963463 10.1007/s11071-020-05503-y 10.3390/e21080790 10.1080/00927879208824389 10.5560/zna.2012-0022 10.1140/epjp/s13360-020-00187-0 10.1155/2018/9389065 10.1016/j.procs.2015.07.394 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2020.2989676 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Mathematics |
EISSN | 2169-3536 |
EndPage | 75490 |
ExternalDocumentID | oai_doaj_org_article_ba4e4a513dd542e4a50f74d8710523d5 10_1109_ACCESS_2020_2989676 9076049 |
Genre | orig-research |
GrantInformation_xml | – fundername: Research Center of the Center for Female Scientific and Medical Colleges, Deanship of Scientific Research, King Saud University funderid: 10.13039/501100011665 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABVLG ACGFS ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IFIPE IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RIG RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-f8ac1640f75ea8bc7d35afe4d8221e230c1e46f40713ebcfa50a4e452d46e37f3 |
IEDL.DBID | RIE |
ISSN | 2169-3536 |
IngestDate | Thu Sep 05 15:45:30 EDT 2024 Fri Sep 13 04:12:07 EDT 2024 Fri Aug 23 03:24:48 EDT 2024 Wed Jun 26 19:27:09 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-f8ac1640f75ea8bc7d35afe4d8221e230c1e46f40713ebcfa50a4e452d46e37f3 |
ORCID | 0000-0002-3507-9367 0000-0002-8979-0816 0000-0002-1898-4082 0000-0001-8146-5843 0000-0002-4915-9325 0000-0002-8780-0240 0000-0002-7845-7751 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9076049 |
PQID | 2454092018 |
PQPubID | 4845423 |
PageCount | 18 |
ParticipantIDs | proquest_journals_2454092018 doaj_primary_oai_doaj_org_article_ba4e4a513dd542e4a50f74d8710523d5 ieee_primary_9076049 crossref_primary_10_1109_ACCESS_2020_2989676 |
PublicationCentury | 2000 |
PublicationDate | 20200000 2020-00-00 20200101 2020-01-01 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – year: 2020 text: 20200000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2020 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref57 ref13 ref56 ref12 ref59 ref15 ref58 ref14 ref53 ref52 ref55 ref11 ref54 ref10 ref17 ref16 ref19 ref18 ref51 ref50 matsui (ref35) 1993 hussain (ref61) 2011; 48 ref46 ref48 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 tian (ref45) 0; 1 ref9 ref4 ref3 higman (ref29) 1983; 1 ref6 ref5 ref40 daemen (ref39) 2002 ref34 ref37 ref33 ref32 ref2 ref1 ref38 yi (ref62) 1997; 2 lyndon (ref31) 2015; 89 cameron (ref30) 2013 ref24 ref23 ref26 ref25 ref64 ref20 ref63 burnett (ref36) 2005 ref22 ref21 ref28 ref27 ref60 |
References_xml | – ident: ref33 doi: 10.1049/ip-e.1988.0044 – ident: ref48 doi: 10.1007/s00521-018-3557-3 – ident: ref43 doi: 10.1109/AICCSA.2014.7073265 – ident: ref38 doi: 10.1007/978-3-642-80350-5_30 – ident: ref55 doi: 10.1007/s11071-018-4478-5 – year: 2005 ident: ref36 article-title: Heuristic optimization of Boolean functions and substitution boxes for cryptography contributor: fullname: burnett – ident: ref52 doi: 10.1007/s11071-017-3409-1 – ident: ref13 doi: 10.15388/Informatica.2009.235 – volume: 2 start-page: 689 year: 1997 ident: ref62 article-title: A method for obtaining cryptographically strong $8\times8$ S-boxes publication-title: Proc IEEE Globe Telecommun Conf (GLOBECOM) contributor: fullname: yi – ident: ref12 doi: 10.1109/TCYB.2018.2846186 – ident: ref9 doi: 10.1007/978-3-642-04101-3 – ident: ref11 doi: 10.1007/s10773-019-04188-3 – ident: ref46 doi: 10.1016/j.pisc.2016.06.001 – ident: ref41 doi: 10.1007/s00521-015-1887-y – ident: ref51 doi: 10.1007/s11071-016-3199-x – ident: ref56 doi: 10.1016/j.amc.2018.03.019 – ident: ref24 doi: 10.1007/s11042-019-08464-6 – ident: ref10 doi: 10.1007/978-3-540-30539-2_6 – ident: ref14 doi: 10.1007/s10773-019-04254-w – ident: ref28 doi: 10.1016/j.camwa.2012.05.017 – ident: ref42 doi: 10.1080/1023697X.2012.10669006 – ident: ref22 doi: 10.1007/s11277-020-07052-4 – ident: ref16 doi: 10.1155/2017/6969312 – ident: ref4 doi: 10.1109/81.904880 – volume: 89 year: 2015 ident: ref31 publication-title: Combinatorial Group Theory contributor: fullname: lyndon – ident: ref53 doi: 10.1007/s11277-017-5054-x – ident: ref54 doi: 10.1007/s00521-017-3287-y – ident: ref25 doi: 10.1109/ACCESS.2019.2956385 – ident: ref34 doi: 10.1007/3-540-39799-X_41 – ident: ref1 doi: 10.1142/S021812749800098X – ident: ref2 doi: 10.1109/TCSI.2001.972857 – ident: ref8 doi: 10.1504/IJCNDS.2014.057991 – year: 2002 ident: ref39 publication-title: The Design of Rijndael AES The Advanced Encryption Standard contributor: fullname: daemen – start-page: 386 year: 1993 ident: ref35 article-title: Linear cryptanalysis method for DES cipher publication-title: Proc Workshop Theory Appl Cryptograph Techn contributor: fullname: matsui – ident: ref47 doi: 10.1007/s11071-016-3295-y – ident: ref18 doi: 10.3390/e21101004 – volume: 1 start-page: 232 year: 0 ident: ref45 article-title: S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm publication-title: J Syst Eng Electron 27 no contributor: fullname: tian – volume: 1 start-page: 159 year: 1983 ident: ref29 article-title: Coset diagrams and relations for PSL (2, Z) publication-title: Arab Gulf J Sci Res contributor: fullname: higman – ident: ref19 doi: 10.1109/ACCESS.2020.2970806 – ident: ref15 doi: 10.3390/e21030245 – ident: ref57 doi: 10.1109/ACCESS.2019.2911395 – ident: ref27 doi: 10.1109/ICUMT.2012.6459712 – ident: ref49 doi: 10.1007/s11071-012-0675-9 – ident: ref7 doi: 10.1016/j.ijleo.2015.11.221 – ident: ref5 doi: 10.1007/s11277-018-5787-1 – ident: ref26 doi: 10.1109/ACCESS.2019.2906222 – ident: ref59 doi: 10.1109/ACCESS.2020.2973679 – ident: ref63 doi: 10.1080/01611190802653228 – ident: ref23 doi: 10.1109/ACCESS.2020.2975880 – ident: ref40 doi: 10.1109/ACCESS.2018.2871557 – ident: ref37 doi: 10.1016/j.ins.2012.02.030 – ident: ref64 doi: 10.1007/s11071-016-3046-0 – ident: ref3 doi: 10.3390/e20070525 – ident: ref50 doi: 10.1016/j.chaos.2013.11.001 – ident: ref6 doi: 10.1109/7384.963463 – start-page: 1 year: 2013 ident: ref30 article-title: Encyclopaedia of design theory publication-title: Cayley Graphs and Coset Diagrams contributor: fullname: cameron – ident: ref21 doi: 10.1007/s11071-020-05503-y – ident: ref17 doi: 10.3390/e21080790 – ident: ref32 doi: 10.1080/00927879208824389 – ident: ref60 doi: 10.5560/zna.2012-0022 – ident: ref20 doi: 10.1140/epjp/s13360-020-00187-0 – ident: ref58 doi: 10.1155/2018/9389065 – volume: 48 start-page: 111 year: 2011 ident: ref61 article-title: Some analysis of S-box based on residue of prime number publication-title: Proc Pakistan Acad Sci contributor: fullname: hussain – ident: ref44 doi: 10.1016/j.procs.2015.07.394 |
SSID | ssj0000816957 |
Score | 2.4509804 |
Snippet | The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches.... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Publisher |
StartPage | 75473 |
SubjectTerms | block ciphers Boxes Ciphers coset graphs Cryptography Encryption Graphical methods Graphs Group theory Mathematics modular symmetric group Multimedia Permutations Robustness Substitutes Substitution-boxes |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELUQEwwIKIhCQR4YCY0TOx9jW_EhpLJApW6WY59ZaINIQfDvuXMCqsTAwhZZVhK_S-7una13jJ0LVRiSjYqURboqHfrByqU2AjAYLEufphXVIaf32e1M3s3VfK3VF50Ja-WBW-CGlZEgjRKpc0omdBn7XDrM86mg6Vr1UqHWyFTwwYXISpV3MkMiLoejyQRXhIQwiS9JdTwjlZG1UBQU-7sWK7_8cgg217tsp8sS-ah9uz22Act9tr2mHdhjMOL39Ts882noAc0x-eSthjRBzWvPH6jK_cTJNYTzADgcjesPaPgYQ5fjOGtSN7DiNyRa3XCzdPzhc7GgHluWh6JUc8Bm11ePk9uo65kQWRkXq8gXxiIDQowUmKKyuUuV8YCAJYkA5BtWgMw80bgUKusRTgJYJU5mkOY-PWSby3oJR4y7xJcJbQErYWXufUFiZZhvgKH26UL02cU3fPqllcbQgVLEpW7R1oS27tDuszFB_DOVdK3DAFpbd9bWf1m7z3pkoJ-blLSxKMs-G3wbTHf_YKMTEhcsMcEpjv_j0Sdsi5bTll8GbHP1-ganmJCsqrPw7X0B2NXZiw priority: 102 providerName: Directory of Open Access Journals |
Title | A Novel Method for Generation of Strong Substitution-Boxes Based on Coset Graphs and Symmetric Groups |
URI | https://ieeexplore.ieee.org/document/9076049 https://www.proquest.com/docview/2454092018/abstract/ https://doaj.org/article/ba4e4a513dd542e4a50f74d8710523d5 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T-QwEB4BFRTc8RJ7B8gFJVnysDdJubs6QEhLA0h0kWOPKYANItnTwa-_GScbIaCgcywnGmdsz3xj-xuA40hlmmmjAmUIrkpL62BpExMgajKWuUuSkuOQs6vRxa28vFN3K3DS34VBRH_4DIdc9Hv5tjILDpWd5ryNJPNVWM3CuL2r1cdTOIFErtKOWCgK89PxdEp9IAgYh0PmGR8xr8g74-M5-rukKp9WYm9ezn7AbClYe6rkYbhoyqF5-8DZ-F3Jf8Jm52eKcTswtmAF59uw8Y59kJ5mPWVrvQM4FlfVX3wUM59TWpAzK1pOaladqJy45qj5veClxp8voOpgUv3DWkzIFFpBraZVjY04ZxLsWui5FdevT0-cs8sIH-Sqd-H27M_N9CLocjAERoZZE7hMG0JUoUsV6qw0qU2UdigtORYREn4xEcqRY1iYYGmcVqGWKFVs5QiT1CV7sDav5rgPwsYuj3lLWUVGps5lTH5G_gtqTsceRQM4WSqneG6pNgoPUcK8aHVZsC6LTpcDmLAC-6bMk-0r6McX3bQjV4CE0SpKrFUy5iL1hIQnv4oQuFUD2GFl9R_p9DSAg-VwKLo5XRcxkxXm5DBlv75-6zess4BtgOYA1pqXBR6Sy9KURx7qH_kR-x_CHOjw |
link.rule.ids | 315,786,790,802,870,2115,4043,27956,27957,27958,55109 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VcoAeeBXEQgEfODbbPOxNctxdURZo9tJW6s1y7DEH6AY1WQT8emacbFQBB25O4kTjjO35Zmx_A_A2UYVh2qhIWXJXpaN5sHaZjRANGcvSZ1nNcchqPVtdyo9X6moPjsezMIgYNp_hlIthLd81dsuhspOSl5FkeQfukp2Py_601hhR4RQSpcoHaiF6fjJfLqkV5ASm8ZSZxmfMLHLL_ASW_iGtyl9zcTAwpw-h2onW7yv5Mt129dT--oO18X9lfwQPBqQp5n3XeAx7uHkCB7f4B-mqGklb20PAuVg33_GrqEJWaUFwVvSs1Kw80XhxznHzz4Inm7DDgG5Hi-YHtmJBxtAJqrVsWuzEe6bBboXZOHH-8_qas3ZZEcJc7VO4PH13sVxFQxaGyMq46CJfGEs-Vexzhaaobe4yZTxKR9AiQfJgbIJy5tkxzLC23qjYSJQqdXKGWe6zZ7C_aTb4HIRLfZnyorJKrMy9L5j-jBAMGk7IniQTON4pR3_ryTZ0cFLiUve61KxLPehyAgtW4FiVmbLDDfrxehh4BAZIGKOSzDklUy5SS0h4Qlbkgzs1gUNW1viRQU8TONp1Bz2M6lanTFdYEmQqXvz7rTdwb3VRnemzD-tPL-E-C9uHa45gv7vZ4isCMF39OvTb37MD61E |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Method+for+Generation+of+Strong+Substitution-Boxes+Based+on+Coset+Graphs+and+Symmetric+Groups&rft.jtitle=IEEE+access&rft.au=Razaq%2C+Abdul&rft.au=Alolaiyan%2C+Hanan&rft.au=Ahmad%2C+Musheer&rft.au=Yousaf%2C+Muhammad+Awais&rft.date=2020&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=8&rft.spage=75473&rft.epage=75490&rft_id=info:doi/10.1109%2FACCESS.2020.2989676&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2020_2989676 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |