2015
DOI: 10.1007/s13319-015-0043-x
|View full text |Cite
|
Sign up to set email alerts
|

S-Boxes Based on Affine Mapping and Orbit of Power Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
9
1

Relationship

3
7

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…Different data security schemes have been proposed based on different mathematical structures such as elliptic curves [3][4][5][6][7][8][9], algebraic structures [10][11][12][13][14][15], chaotic maps [16][17][18][19][20][21] and fuzzy set theory [22,23]. Security and privacy of the text messages are major concerns of the users while communicating on popular messaging platforms such as WhatsApp and Signal.…”
Section: Introductionmentioning
confidence: 99%
“…Different data security schemes have been proposed based on different mathematical structures such as elliptic curves [3][4][5][6][7][8][9], algebraic structures [10][11][12][13][14][15], chaotic maps [16][17][18][19][20][21] and fuzzy set theory [22,23]. Security and privacy of the text messages are major concerns of the users while communicating on popular messaging platforms such as WhatsApp and Signal.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography has become really handy and image cryptography [3][4][5][6], color image cryptography has been introduced [7] and chocolate cryptography also has been developed [8]. Stegano-cryptosystems introduced as well as researchers have also create new approaches in cryptography including S-Boxes [9][10][11][12][13][14][15][16][17][18][19].…”
Section: Introduction and Historymentioning
confidence: 99%
“…Khan and Azam [12] proposed a method for the construction of multiple S-boxes based on a group action and Gray codes. Similarly, Khan and Azam [13] presented another algorithm for the design of S-boxes based on affine and power mappings. It is shown computationally that all of the newly generated S-boxes have high security against modern attacks.…”
Section: Introductionmentioning
confidence: 99%