-
1
-
-
84876438336
-
A projective general linear group based algorithm for the construction of substitution box for block ciphers
-
doi:10.1007/s00521-012-0870-0
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0870-0
-
(2012)
Neural Comput. Appl.
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
2
-
-
84867728541
-
Analysis of S-box in image encryption using root mean square error method
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Analysis of S-box in image encryption using root mean square error method. Z. Naturforsch. A 67a, 327-332 (2012)
-
(2012)
Z. Naturforsch. A
, vol.67 A
, pp. 327-332
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
3
-
-
84865803149
-
Generalized majority logic criterion to analyze the statistical strength of S-boxes
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z. Naturforsch. A 67a, 282-288 (2012)
-
(2012)
Z. Naturforsch. A
, vol.67 A
, pp. 282-288
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
4
-
-
84879838956
-
A group theoretic approach to construct cryptographically strong substitution boxes
-
doi:10.1007/s00521-012-0914-5
-
Hussain, I., Shah, T., Mahmood, H.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0914-5
-
(2012)
Neural Comput. Appl.
-
-
Hussain, I.1
Shah, T.2
Mahmood, H.3
-
5
-
-
84867898403
-
Image encryption algorithm based on PGL(2,GF(2∧8)) S-boxes and TD-ERCS chaotic sequence
-
doi:10.1007/s11071-012-0440-0440
-
Hussain, I., Shah, T., Gondal, M.A.: Image encryption algorithm based on PGL(2,GF(2∧8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0440-0
-
(2012)
Nonlinear Dyn.
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
-
6
-
-
84865783598
-
S8 affine power affine S-boxes and their application
-
doi:10.1007/s00521-012-1036-9
-
Hussain, I., Shah, T.: S8 affine power affine S-boxes and their application. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-1036-9
-
(2012)
Neural Comput. Appl.
-
-
Hussain, I.1
Shah, T.2
-
7
-
-
84866731670
-
Construction of S8 Lui J S-boxes and their application
-
doi:10.1016/j.camwa.2012.05.017
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Construction of S8 Lui J S-boxes and their application. Comput. Math. Appl. (2012). doi:10.1016/j.camwa.2012.05.017
-
(2012)
Comput. Math. Appl.
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
8
-
-
84867580749
-
An efficient image encryption algorithm based on S8 S-box transformation and NCA map
-
doi:10.1016/j.optcom.2012.06.011
-
Hussain, I., Shah, T., Gondal, M.A.: An efficient image encryption algorithm based on S8 S-box transformation and NCA map. Opt. Commun. (2012). doi:10.1016/j.optcom. 2012.06.011
-
(2012)
Opt. Commun.
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
-
9
-
-
84864936221
-
Analyses of SKIPJACK S-box
-
Hussain, I., Shah, T., Gondal, M.A., Wang, Y.: Analyses of SKIPJACK S-box. World Appl. Sci. J. 13(11), 2385-2388 (2011)
-
(2011)
World Appl. Sci. J.
, vol.13
, Issue.11
, pp. 2385-2388
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Wang, Y.4
-
10
-
-
84864934556
-
Construction of cryptographically strong 8 × 8 S-boxes
-
Hussain, I., Shah, T., Gondal, M.A., Khan,W.A.: Construction of cryptographically strong 8 × 8 S-boxes.World Appl. Sci. J. 13(11), 2389-2395 (2011)
-
(2011)
World Appl. Sci. J.
, vol.13
, Issue.11
, pp. 2389-2395
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Khan, W.A.4
-
11
-
-
84864917746
-
Construction of new S-box using a linear fractional transformation
-
Hussain, I., Shah, T., Gondal, M.A., Khan,W.A., Khan, M.: Construction of new S-box using a linear fractional transformation. World Appl. Sci. J. 14(12), 1779-1785 (2011)
-
(2011)
World Appl. Sci. J.
, vol.14
, Issue.12
, pp. 1779-1785
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Khan, W.A.4
Khan, M.5
-
12
-
-
80052669713
-
Statistical analysis of S-box in image encryption applications based on majority logic criterion
-
Shah, T., Hussain, I., Gondal, M.A., Mahmood, H.: Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int. J. Phys. Sci. 6(16), 4110-4127 (2011)
-
(2011)
Int. J. Phys. Sci.
, vol.6
, Issue.16
, pp. 4110-4127
-
-
Shah, T.1
Hussain, I.2
Gondal, M.A.3
Mahmood, H.4
-
13
-
-
80053462731
-
Some analysis of S-Box based on residue of prime number
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Some analysis of S-Box based on residue of prime number. Proc. Pak. Acad. Sci. 48(2), 111-115 (2011)
-
(2011)
Proc. Pak. Acad. Sci.
, vol.48
, Issue.2
, pp. 111-115
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
14
-
-
80052654803
-
A new algorithm to construct secure keys for AES
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A new algorithm to construct secure keys for AES. Int. J. Contemp. Math. Sci. 5(26), 1263-1270 (2010)
-
(2010)
Int. J. Contemp. Math. Sci.
, vol.5
, Issue.26
, pp. 1263-1270
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
15
-
-
80054812135
-
Comparative analysis of S-boxes based on graphical SAC
-
Hussain, I., Shah, T., Mahmood, H., Afzal, M.: Comparative analysis of S-boxes based on graphical SAC. Int. J. Comput. Appl. 2(5), 975-8887 (2010)
-
(2010)
Int. J. Comput. Appl.
, vol.2
, Issue.5
, pp. 975-8887
-
-
Hussain, I.1
Shah, T.2
Mahmood, H.3
Afzal, M.4
-
16
-
-
84864910545
-
Graphical Sac analysis of S8 APA S-box
-
Hussain, I., Shah, T., Aslam, K.S.: Graphical Sac analysis of S8 APA S-box. Adv. Algebra 3(1), 57-62 (2010)
-
(2010)
Adv. Algebra
, vol.3
, Issue.1
, pp. 57-62
-
-
Hussain, I.1
Shah, T.2
Aslam, K.S.3
-
18
-
-
0026397734
-
Differential cryptanalysis of DESlike cryptosystems
-
Biham, E., Shamir, A.: Differential cryptanalysis of DESlike cryptosystems. J. Cryptol. 4(1), 3-72 (1991)
-
(1991)
J. Cryptol.
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
19
-
-
85025704284
-
Linear cryptanalysis method of des cipher
-
Advances in Cryptology, Springer, Berlin
-
Matsui,M.: Linear cryptanalysis method of DES cipher. In: Advances in Cryptology, Proc. Eurocrypt'93. LNCS, vol. 765, pp. 386-397. Springer, Berlin (1994)
-
(1994)
Proc. Eurocrypt'93. LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
20
-
-
84962968104
-
Differentially uniform mappings for cryptography
-
Advances in Cryptology, Springer, Berlin
-
Nyberg, K.: Differentially uniform mappings for cryptography. In: Advances in Cryptology, Proc. Eurocrypt'93. LNCS, vol. 765, pp. 55-64. Springer, Berlin (1994)
-
(1994)
Proc. Eurocrypt'93. LNCS
, vol.765
, pp. 55-64
-
-
Nyberg, K.1
-
21
-
-
0035250017
-
Chaos and cryptography: Block encryption ciphers based on chaotic maps
-
Jakimoski, G., Kocarev, L.: Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. I 48(2), 163-169 (2001)
-
(2001)
IEEE Trans. Circuits Syst. I
, vol.48
, Issue.2
, pp. 163-169
-
-
Jakimoski, G.1
Kocarev, L.2
-
22
-
-
29244491993
-
On the dynamical degradation of digital piecewise linear chaotic maps
-
Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 15(10), 3119-3151 (2005)
-
(2005)
Int. J. Bifurc. Chaos
, vol.15
, Issue.10
, pp. 3119-3151
-
-
Li, S.1
Chen, G.2
Mou, X.3
-
23
-
-
0003627794
-
-
2nd edn. Springer, Berlin
-
Peitegen, H.-O., Jürgens, H., Saupe, D.: Chaos and Fractals: New Frontiers of Science, 2nd edn. Springer, Berlin (2004)
-
(2004)
Chaos and Fractals: New Frontiers of Science
-
-
Peitegen, H.-O.1
Jürgens, H.2
Saupe, D.3
-
24
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(8), 2129-2151 (2006)
-
(2006)
Int. J. Bifurc. Chaos
, vol.16
, Issue.8
, pp. 2129-2151
-
-
Alvarez, G.1
Li, S.2
-
25
-
-
33747348397
-
An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps
-
Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31, 571-579 (2007)
-
(2007)
Chaos Solitons Fractals
, vol.31
, pp. 571-579
-
-
Chen, G.1
Chen, Y.2
Liao, X.3
-
26
-
-
4243129231
-
A novel method for designing S-boxes based on chaotic maps
-
Tang, G., Liao, X., Chen, Y.: A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23, 413-419 (2005)
-
(2005)
Chaos Solitons Fractals
, vol.23
, pp. 413-419
-
-
Tang, G.1
Liao, X.2
Chen, Y.3
-
27
-
-
39449097568
-
Efficient and simple method for designing chaotic S-boxes
-
Asim,M., Jeoti, V.: Efficient and simple method for designing chaotic S-boxes. ETRI J. 30, 170-172 (2008)
-
(2008)
ETRI J.
, vol.30
, pp. 170-172
-
-
Asim, M.1
Jeoti, V.2
-
28
-
-
0030833521
-
Statistics of chaotic binary sequences
-
Kohda, T., Tsuneda, A.: Statistics of chaotic binary sequences. IEEE Trans. Inf. Theory 43, 104-120 (1997)
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, pp. 104-120
-
-
Kohda, T.1
Tsuneda, A.2
-
29
-
-
58349102181
-
Study of a discrete chaotic system based on tangent-delay for elliptic reflecting cavity and its properties
-
Sheng, L., Sun, K., Li, C.: Study of a discrete chaotic system based on tangent-delay for elliptic reflecting cavity and its properties. Acta Phys. Sin. 53, 2871-2876 (2004)
-
(2004)
Acta Phys. Sin.
, vol.53
, pp. 2871-2876
-
-
Sheng, L.1
Sun, K.2
Li, C.3
-
30
-
-
24744465852
-
Pseudo-random number generator based on NCAS chaos and its statistic characteristics analysis
-
Sheng, L., Cao, L., Sun, K.: Pseudo-random number generator based on NCAS chaos and its statistic characteristics analysis. Acta Phys. Sin. 54, 4031-4037 (2005)
-
(2005)
Acta Phys. Sin.
, vol.54
, pp. 4031-4037
-
-
Sheng, L.1
Cao, L.2
Sun, K.3
|