Results 31 to 40 of about 480,128 (291)

An efficient construction of key-dependent substitution box based on chaotic sine map

open access: yesInternational Journal of Distributed Sensor Networks, 2019
A substitution box is a core component of the popular symmetric-key algorithms. However, the major problem of the conventional substitution boxes is the statistic behavior, which is employed as a fixed-size lookup table.
Muhammad Usama   +3 more
doaj   +1 more source

Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)

open access: yesJurnal Matematika, 2016
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj   +1 more source

Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation

open access: yesComplexity, 2020
This paper proposes to present a novel method of generating cryptographic dynamic substitution-boxes, which makes use of the combined effect of discrete hyperchaos mapping and algebraic group theory.
Musheer Ahmad, Eesa Al-Solami
doaj   +1 more source

Designing S-Box Using Tent-Sine Chaotic System While Combining the Traits of Tent and Sine Map

open access: yesIEEE Access, 2023
Secure exchange of sensitive information between different entities is a serious challenge in today’s environment. Therefore, various cryptosystems have been created specifically for this purpose. Various operations are used in these cryptosystems.
Annas Wasim Malik   +4 more
doaj   +1 more source

Efficient and Secure Chaotic S-Box for Wireless Sensor Network [PDF]

open access: yes, 2014
International audienceInformation security using chaotic dynamics is a novel topic in the wireless sensor network (WSN) research field. After surveying analog and digital chaotic security systems, we give a state of the art of chaotic S-Box design.
Alvarez   +23 more
core   +4 more sources

Understanding the Technological Substitution by Hybrid Modelling Practice: a Methodological Approach

open access: yesChemical Engineering Transactions, 2015
Various novel climate technologies and eco-innovations have already reached a mature state, but they diffuse slowly into the market. Due to this slow process the mitigation of climate change does not take the most effective path.
L. Timma, A. Blumberga, D. Blumberga
doaj   +1 more source

(Leftmost-Outermost) Beta Reduction is Invariant, Indeed [PDF]

open access: yes, 2015
Slot and van Emde Boas' weak invariance thesis states that reasonable machines can simulate each other within a polynomially overhead in time. Is lambda-calculus a reasonable machine?
Accattoli, Beniamino, Lago, Ugo Dal
core   +5 more sources

Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution

open access: yesIEEE Access, 2020
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise to data sharing through the Internet. This data transfer via open public networks are susceptible to several types of attacks.
Abdullah Qayyum   +7 more
doaj   +1 more source

Substitution Box Optimization

open access: yes, 2019
The basic principle of encryption is to transform plain data into unintelligible data via a series of steps referred to as an encryption algorithm. The input to this algorithm is called plaintext, and its output encoded version is called as cipher text.
Aaruni P M   +4 more
openaire   +1 more source

Ligand Substitution Dynamics [PDF]

open access: yes, 1968
Substitution of a ligand in an inner sphere complex by an outside group is the most fundamental reaction in metal ion ...
Gray, Harry B., Langford, Cooper H.
core   +1 more source

Home - About - Disclaimer - Privacy