2023
DOI: 10.1016/j.heliyon.2023.e15902
|View full text |Cite
|
Sign up to set email alerts
|

Secure communication through reliable S-box design: A proposed approach using coset graphs and matrix operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
1
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 40 publications
0
1
0
Order By: Relevance
“…In contrast to cryptography, which primarily focuses on ensuring message confidentiality, digital watermarking places greater emphasis on copyright protection and tracing [1,2]. Classical watermarking involves the covert embedding of a watermark (a sequence of data) within media files, allowing for the extraction of this watermark even after data distribution or manipulation, enabling the identification of data sources or copyright ownership [3].…”
Section: Introductionmentioning
confidence: 99%
“…In contrast to cryptography, which primarily focuses on ensuring message confidentiality, digital watermarking places greater emphasis on copyright protection and tracing [1,2]. Classical watermarking involves the covert embedding of a watermark (a sequence of data) within media files, allowing for the extraction of this watermark even after data distribution or manipulation, enabling the identification of data sources or copyright ownership [3].…”
Section: Introductionmentioning
confidence: 99%
“…This challenging environment necessitates a reevaluation of existing cryptographic countermeasures. The scientific community is called upon to not only improve but to fundamentally transform security approaches [23]. The motivation for this transformation is grounded in a critical understanding: isolated, even potent, modern cryptographic techniques may fall short against multifaceted attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Tempered-type fractional derivatives in discrete time were proposed, and the encryption was discussed in [31]. Motivated by the investigations performed in the recent literature towards the field of image encryption [32][33][34][35][36][37][38], this article aims to contribute the following.…”
Section: Introductionmentioning
confidence: 99%