2018
DOI: 10.1007/s11277-018-5787-1
|View full text |Cite
|
Sign up to set email alerts
|

ABC Optimization Based Construction of Strong Substitution-Boxes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
10

Relationship

4
6

Authors

Journals

citations
Cited by 55 publications
(42 citation statements)
references
References 40 publications
0
42
0
Order By: Relevance
“…These chaos topographies make chaotic systems as a choice for the development of modern ciphers and many researchers have used chaos in the design of S-boxes. Authors [29][30][31][32][33][34][35][36][37][38][39] suggested S-boxes based on chaotic map and analyzed these along with the other existing S-box design methods. Analyses disclosed that the proposed S-boxes are strong against different attacks and hence suggest their usage in modern block ciphers.…”
Section: Related Workmentioning
confidence: 99%
“…These chaos topographies make chaotic systems as a choice for the development of modern ciphers and many researchers have used chaos in the design of S-boxes. Authors [29][30][31][32][33][34][35][36][37][38][39] suggested S-boxes based on chaotic map and analyzed these along with the other existing S-box design methods. Analyses disclosed that the proposed S-boxes are strong against different attacks and hence suggest their usage in modern block ciphers.…”
Section: Related Workmentioning
confidence: 99%
“…The results indicate that the proposed S-Box is more effective when compared to its counterparts. The authors in [ 31 , 32 , 33 , 34 , 35 ] proposed strong S-Boxes based on the combination of chaotic maps and other different algorithms. The evaluation of the cryptographic performance of these S-Boxes against NL, SAC, BIC, etc.…”
Section: Introductionmentioning
confidence: 99%
“…The most popular and standard cryptographic properties of S-boxes are as follows: high nonlinearity, low differential uniformity, the strict avalanche criterion equals to 0.5, the satisfaction of bits independence criterion for high bits independence criterion (BIC) nonlinearity and BIC–strict avalanche criterion (SAC) close to 0.5, and low linear approximation probability. A majority of the existing S-boxes schemes have scrutinized their constructed S-boxes mainly against these security properties [ 37 , 38 , 39 , 40 , 41 ]. The following subsections analyzed the proposed S-boxes under the mentioned properties.…”
Section: Performance Results and Analysesmentioning
confidence: 99%