Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization

Cryptography often involves substituting (and converting) the secret information into dummy data so that it could reach the desired destination without leakage. Within symmetric key cryptography, substitution-box (S-box) is often adopted to perform the actual block cipher substitution. To address th...

Full description

Saved in:
Bibliographic Details
Main Authors: Kamal Z., Zamli, Abdul Kader, ., Fakhrud Din, ., Alhadawi, Hussam S.
Format: Article
Language:English
Published: Springer 2021
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/33976/1/Selective%20chaotic%20maps%20Tiki-Taka.pdf
http://umpir.ump.edu.my/id/eprint/33976/
https://doi.org/10.1007/s00521-021-06260-8
https://doi.org/10.1007/s00521-021-06260-8
Tags: Add Tag
No Tags, Be the first to tag this record!