supported by the Open Project of Henan Key Laboratory of Network Cryptography Technology(NO.LNCT2021-A09);the Advanced Discipline Construction Project of Beijing Universities(20210101Z0401).
In MILCOM 2015,Kelly et al.proposed the authentication encryption algorithm MK-3,which applied the 16-bit S-box.This paper aims to implement the 16-bit S-box with less circuit area.First,we classifed the irreducible p...
A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,whic...
supported by the MSIT(Ministry of Science and ICT),Republic of Korea,under the ITRC(Information Technology Research Center)support program(IITP-2024-RS-2022-00164800)supervised by the IITP(Institute for Information&Communications Technology Planning&Evaluation).
Quantum computers accelerate many algorithms based on the superposition principle of quantum mechanics.The Grover algorithm provides significant performance to malicious users attacking symmetric key systems.Since the...
The SubBytes (S-box) transformation is the most crucial operation in the AES algorithm, significantly impacting the implementation performance of AES chips. To design a high-performance S-box, a segmented optimization...
The rapid advancement of data in web-based communication has created one of the biggest issues concerning the security of data carried over the internet from unauthorized access.To improve data security,modern cryptos...
The authors received the funding for this study from King Saud University,Riyadh,Saudi Arabia under the research supporting project Number RSP 2023R167.Sameh Askar received this grant from King Saud University。
Nowadays,one of the most important difficulties is the protection and privacy of confidential data.To address these problems,numerous organizations rely on the use of cryptographic techniques to secure data from illeg...
funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University,through the Research Funding Program,Grant No.(FRP-1443-11).
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ...
funded by Deanship of Scientific Research at Najran University under the Research Groups Funding Program Grant Code(NU/RG/SERC/12/3);also by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2023R333);Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal ...