Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption
Published 2016 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption
Authors
Keywords
Cryptography, S-box, Chaos, Substitution, Permutation
Journal
NONLINEAR DYNAMICS
Volume 87, Issue 1, Pages 337-361
Publisher
Springer Nature
Online
2016-08-30
DOI
10.1007/s11071-016-3046-0
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Circular inter–intra pixels bit-level permutation and chaos-based image encryption
- (2016) Adrian-Viorel Diaconu INFORMATION SCIENCES
- Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure
- (2016) Yuansheng Liu et al. NONLINEAR DYNAMICS
- A novel bit-level image encryption algorithm based on chaotic maps
- (2016) Lu Xu et al. OPTICS AND LASERS IN ENGINEERING
- An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems
- (2016) Xiang Li et al. OPTIK
- Image encryption based on three-dimensional bit matrix permutation
- (2016) Wei Zhang et al. SIGNAL PROCESSING
- A new image encryption algorithm based on non-adjacent coupled map lattices
- (2015) Ying-Qian Zhang et al. APPLIED SOFT COMPUTING
- 2D Sine Logistic modulation map for image encryption
- (2015) Zhongyun Hua et al. INFORMATION SCIENCES
- A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization
- (2015) Yong Wang et al. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS
- Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences
- (2015) Ye Liu et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Image encryption algorithm based on hyper-chaotic system and dynamic S-box
- (2015) Yang Liu et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Construction of S-box based on chaotic Boolean functions and its application in image encryption
- (2015) Majid Khan et al. NEURAL COMPUTING & APPLICATIONS
- A novel image encryption algorithm based on chaos and Line map
- (2015) Guomin Zhou et al. NEUROCOMPUTING
- Deciphering an image cipher based on 3-cell chaotic map and biological operations
- (2015) Yushu Zhang et al. NONLINEAR DYNAMICS
- Designing S-boxes based on 3-D four-wing autonomous chaotic system
- (2015) Guangjie Liu et al. NONLINEAR DYNAMICS
- A novel chaotic block image encryption algorithm based on dynamic random growth technique
- (2015) Xingyuan Wang et al. OPTICS AND LASERS IN ENGINEERING
- A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise
- (2015) Hongjun Liu et al. OPTICS COMMUNICATIONS
- A novel image encryption technique based on Hénon chaotic map and S8 symmetric group
- (2014) Majid Khan et al. NEURAL COMPUTING & APPLICATIONS
- Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system
- (2014) Fatih Özkaynak et al. NONLINEAR DYNAMICS
- Using 3-cell chaotic map for image encryption based on biological operations
- (2014) Morteza SaberiKamarposhti et al. NONLINEAR DYNAMICS
- Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process
- (2014) Yushu Zhang et al. NONLINEAR DYNAMICS
- An image encryption scheme using generalized Arnold map and affine cipher
- (2014) Hegui Zhu et al. OPTIK
- Self-adaptive permutation and combined global diffusion for chaotic color image encryption
- (2013) Yushu Zhang et al. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS
- Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack
- (2013) Yushu Zhang et al. NONLINEAR DYNAMICS
- A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces
- (2013) Ahmed A. Abd El-Latif et al. SIGNAL PROCESSING
- A new 1D chaotic system for image encryption
- (2013) Yicong Zhou et al. SIGNAL PROCESSING
- On Statistical Tests for Randomness Included in the NIST SP800-22 Test Suite and Based on the Binomial Distribution
- (2012) Fabio Pareschi et al. IEEE Transactions on Information Forensics and Security
- A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process
- (2012) Benyamin Norouzi et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A projective general linear group based algorithm for the construction of substitution box for block ciphers
- (2012) Iqtadar Hussain et al. NEURAL COMPUTING & APPLICATIONS
- Period of the discrete Arnold cat map and general cat map
- (2012) Jianghong Bao et al. NONLINEAR DYNAMICS
- Breaking a chaotic image encryption algorithm based on perceptron model
- (2012) Yu Zhang et al. NONLINEAR DYNAMICS
- Breaking a novel colour image encryption algorithm based on chaos
- (2012) Chengqing Li et al. NONLINEAR DYNAMICS
- A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm
- (2012) Iqtadar Hussain et al. NONLINEAR DYNAMICS
- A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems
- (2012) Majid Khan et al. NONLINEAR DYNAMICS
- An efficient method for the construction of block cipher with multi-chaotic systems
- (2012) Majid Khan et al. NONLINEAR DYNAMICS
- Color image encryption using spatial bit-level permutation and high-dimension chaotic system
- (2011) Hongjun Liu et al. OPTICS COMMUNICATIONS
- A novel colour image encryption algorithm based on chaos
- (2011) Xingyuan Wang et al. SIGNAL PROCESSING
- A chaotic image encryption algorithm based on perceptron model
- (2010) Xing-Yuan Wang et al. NONLINEAR DYNAMICS
- A method for designing strong S-Boxes based on chaotic Lorenz system
- (2010) Fatih Özkaynak et al. PHYSICS LETTERS A
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started