iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1177/1550147719895957
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T10:57:50Z","timestamp":1725447470730},"reference-count":45,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2019,12]]},"abstract":" A substitution box is a core component of the popular symmetric-key algorithms. However, the major problem of the conventional substitution boxes is the statistic behavior, which is employed as a fixed-size lookup table. To solve the fixed-size lookup table problem, various substitution box construction methods were proposed with key control, but it is hard to enhance all cryptographic properties, for example, linear and differential probabilities. Thus, chaos is applied for key control in designing robust substitution boxes due to unpredictable and random-like behavior. Moreover, the confusion and diffusion properties of cryptography can be achieved by chaos. This article introduces an efficient construction of a key-dependent substitution box based on the mixing property of the chaotic sine map. The substitution box so constructed has very low differential and linear approximation probabilities. The experimental results confirmed that the proposed method to construct substitution box has acceptable cryptographic properties to resist against various cryptanalysis. <\/jats:p>","DOI":"10.1177\/1550147719895957","type":"journal-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T11:43:11Z","timestamp":1576669391000},"page":"155014771989595","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":17,"title":["An efficient construction of key-dependent substitution box based on chaotic sine map"],"prefix":"10.1177","volume":"15","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0153-1201","authenticated-orcid":false,"given":"Muhammad","family":"Usama","sequence":"first","affiliation":[{"name":"Department of Computer Science, Bahria University, Karachi, Pakistan"}]},{"given":"Osama","family":"Rehman","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Bahria University, Karachi, Pakistan"}]},{"given":"Imran","family":"Memon","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bahria University, Karachi, Pakistan"}]},{"given":"Safdar","family":"Rizvi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bahria University, Karachi, Pakistan"}]}],"member":"179","published-online":{"date-parts":[[2019,12,18]]},"reference":[{"key":"bibr1-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.937"},{"key":"bibr2-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"bibr3-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2013.11.001"},{"key":"bibr4-1550147719895957","unstructured":"Schneier B. Applied cryptography: protocols, algorithm, and source code in C. 2nd ed, vol. 13. New York: John Wiley & Sons, 1996."},{"key":"bibr5-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"bibr6-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"bibr7-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"bibr8-1550147719895957","first-page":"611","volume-title":"Proceedings of the 2015 international wireless communications and mobile computing conference (IWCMC)","author":"Belazi A"},{"key":"bibr9-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037656"},{"key":"bibr10-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037655"},{"key":"bibr11-1550147719895957","first-page":"1299","volume-title":"Proceedings of the 2006 international conference on computational intelligence and security","author":"Laskari E"},{"key":"bibr12-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2012.01.009"},{"issue":"2","key":"bibr13-1550147719895957","first-page":"481","volume":"9","author":"Hamdi M","year":"2015","journal-title":"Int J Comput Electr Autom"},{"key":"bibr14-1550147719895957","first-page":"97","volume-title":"Proceedings of the 2015 eighth international conference on contemporary computing (IC3)","author":"Ahmad M"},{"key":"bibr15-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2010.07.019"},{"key":"bibr16-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749800098X"},{"key":"bibr17-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1109\/7384.963463"},{"key":"bibr18-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22456-0_5"},{"key":"bibr19-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2008.09.047"},{"key":"bibr20-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2007.12.026"},{"key":"bibr21-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04070-2_107"},{"key":"bibr22-1550147719895957","volume-title":"Proceedings of the IEEE international symposium on biometrics and security technologies, ISBAST\u201908","author":"Usama M"},{"key":"bibr23-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2009.12.033"},{"key":"bibr24-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168207"},{"key":"bibr25-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(98)00086-3"},{"key":"bibr26-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1109\/81.904880"},{"key":"bibr27-1550147719895957","first-page":"656","volume-title":"Proceedings of the 2016 3rd International Conference on Computer and Information Sciences (ICCOINS)","author":"Usama M"},{"key":"bibr28-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2014.0192"},{"key":"bibr29-1550147719895957","first-page":"441","volume":"33","author":"Patidar V","year":"2009","journal-title":"Informatica"},{"key":"bibr30-1550147719895957","first-page":"1","volume-title":"Proceedings of the ISSCS 2011\u2014international symposium on signals, circuits and systems","author":"Luca A"},{"key":"bibr31-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.10.049"},{"key":"bibr32-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.04.023"},{"key":"bibr33-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.10.022"},{"key":"bibr34-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(04)00454-0"},{"key":"bibr35-1550147719895957","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1007\/978-3-319-13039-2_22","volume-title":"Progress in cryptology\u2014INDOCRYPT 2014","volume":"8885","author":"Picek S"},{"key":"bibr36-1550147719895957","first-page":"386","volume-title":"Advances in cryptology\u2014EUROCRYPT\u201993","volume":"765","author":"Matsui M"},{"key":"bibr37-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"bibr38-1550147719895957","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2011-007"},{"key":"bibr40-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43826-8_10"},{"key":"bibr41-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"bibr42-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"bibr43-1550147719895957","first-page":"127","volume-title":"Proceedings of the IFIP 18th World Computer Congress TC8\/WG8.8 & TC11\/WG11.2 Sixth international conference on smart card research and advanced applications (CARDIS)","volume":"153","author":"Guilley S"},{"key":"bibr44-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_14"},{"key":"bibr45-1550147719895957","first-page":"152","volume":"2014","author":"Fei Y","year":"2014","journal-title":"IACR Cryptol, ePrint Arch"},{"key":"bibr47-1550147719895957","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2214203"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719895957","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147719895957","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719895957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T11:43:17Z","timestamp":1576669397000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147719895957"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":45,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["10.1177\/1550147719895957"],"URL":"http:\/\/dx.doi.org\/10.1177\/1550147719895957","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]}}}