2012
DOI: 10.1007/s11071-012-0675-9
|View full text |Cite
|
Sign up to set email alerts
|

An efficient method for the construction of block cipher with multi-chaotic systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
33
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 115 publications
(34 citation statements)
references
References 6 publications
1
33
0
Order By: Relevance
“…Besides, Figure 5 depicts the statistical results of the LP of comparison algorithms. These results show that the LP of the proposed S-box is not worse than that of algorithms in [25,26,28,30,32,34,37,38,41]. Furthermore, Table 6 summarizes the above-mentioned evaluating criteria results of the experimental algorithms.…”
Section: Linear Approximation Probability Analysismentioning
confidence: 78%
See 1 more Smart Citation
“…Besides, Figure 5 depicts the statistical results of the LP of comparison algorithms. These results show that the LP of the proposed S-box is not worse than that of algorithms in [25,26,28,30,32,34,37,38,41]. Furthermore, Table 6 summarizes the above-mentioned evaluating criteria results of the experimental algorithms.…”
Section: Linear Approximation Probability Analysismentioning
confidence: 78%
“…To verify the generated S-box, we analyze its cryptographic criteria and compare it with many other S-boxes designed in [6][7][8][9][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41]. Moreover, our experimental environment is i3 CPU 540 3.07 GHz, memory 2.00 GHz Inter Core, Matlab2012b.…”
Section: Cryptographic Criteria Analyses Of Proposed S-boxmentioning
confidence: 99%
“…In [19] for generation S-boxes an algorithm based on chaotic map and composition method is used. In [20] a method for the construction of block ciphers with multi-chaotic systems is proposed. In the paper of D. Lambic the security analysis and improvement of a block cipher with dynamic S-boxes based on tent map is analyzed [21].…”
Section: Gfmentioning
confidence: 99%
“…Tian and Lu [15] structured dynamic chaos-based -box in conjunction with DNA sequence operation. Some other more efficient algorithms could be reviewed in [6,[16][17][18][19][20]. In addition to this, applications of -boxes in digital image encryption, steganography, and watermarking have become quite popular and influential in recent years [4,11,13,21].…”
Section: Introductionmentioning
confidence: 99%