{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:56Z","timestamp":1725771296127},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_20","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T09:26:22Z","timestamp":1391765182000},"page":"223-230","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Design of Chaos Based S-Box Using Difference Distribution Table (CD S-Box)"],"prefix":"10.1007","author":[{"given":"Muhammad Asif","family":"Khan","sequence":"first","affiliation":[]},{"given":"Varun","family":"Jeoti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.. Shannon","year":"1949","unstructured":"Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell System Technical Journal"},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.physleta.2007.02.021","volume":"366","author":"J.M. Amig\u00f3","year":"2007","unstructured":"Amig\u00f3, J.M., Kocarev, L., Szczepanski, J.: Theory and practice of chaotic cryptography. Physics Letters A\u00a0366, 211\u2013216 (2007)","journal-title":"Physics Letters A"},{"key":"20_CR3","first-page":"6","volume":"1","author":"L. Kocarev","year":"2001","unstructured":"Kocarev, L.: Chaos-based cryptography: a brief overview, Circuits and Systems. IEEE Magazine\u00a01, 6\u201321 (2001)","journal-title":"IEEE Magazine"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0375-9601(01)00609-0","volume":"289","author":"L. Kocarev","year":"2001","unstructured":"Kocarev, L., Jakimoski, G.: Logistic map as a block encryption algorithm. Physics Letters A\u00a0289, 199\u2013206 (2001)","journal-title":"Physics Letters A"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/81.974872","volume":"49","author":"N. Masuda","year":"2002","unstructured":"Masuda, N., Aihara, K.: Cryptosystems with discretized chaotic maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications\u00a049, 28\u201340 (2002)","journal-title":"IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TCSI.2004.841602","volume":"52","author":"J. Szczepanski","year":"2005","unstructured":"Szczepanski, J., Amigo, J.M., Michalek, T., Kocarev, L.: Cryptographically secure substitutions based on the approximation of mixing maps. IEEE Transactions on Circuits and Systems I: Regular Papers\u00a052, 443\u2013453 (2005)","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.physleta.2007.01.081","volume":"366","author":"S. Behnia","year":"2007","unstructured":"Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A.: A. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Physics Letters A\u00a0366, 391\u2013396 (2007)","journal-title":"Physics Letters A"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.chaos.2006.08.003","volume":"36","author":"G. Chen","year":"2008","unstructured":"Chen, G.: A novel heuristic method for obtaining S-boxes. Chaos, Solitons & Fractals\u00a036, 1028\u20131036 (2008)","journal-title":"Chaos, Solitons & Fractals"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.chaos.2005.10.022","volume":"31","author":"G. Chen","year":"2007","unstructured":"Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos, Solitons & Fractals\u00a031, 571\u2013579 (2007)","journal-title":"Chaos, Solitons & Fractals"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"3733","DOI":"10.1016\/j.physleta.2010.07.019","volume":"374","author":"F. \u00d6zkaynak","year":"2010","unstructured":"\u00d6zkaynak, F., \u00d6zer, A.B.: A method for designing strong S-Boxes based on chaotic Lorenz system. Physics Letters A\u00a0374, 3733\u20133738 (2010)","journal-title":"Physics Letters A"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.1016\/j.chaos.2004.07.033","volume":"23","author":"G. Tang","year":"2005","unstructured":"Tang, G., Liao, X.: A method for designing dynamical S-boxes based on discretized chaotic map. Chaos, Solitons & Fractals\u00a023, 1901\u20131909 (2005)","journal-title":"Chaos, Solitons & Fractals"},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.chaos.2004.04.023","volume":"23","author":"G. Tang","year":"2005","unstructured":"Tang, G., Liao, X., Chen, Y.: A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons & Fractals\u00a023, 413\u2013419 (2005)","journal-title":"Chaos, Solitons & Fractals"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/BF03037656","volume":"23","author":"J.A. Clark","year":"2005","unstructured":"Clark, J.A., Jacob, J.L., Stepney, S.: The design of S-boxes by simulated annealing. New Gen. Comput.\u00a023, 219\u2013231 (2005)","journal-title":"New Gen. Comput."},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/BF03037655","volume":"23","author":"J. Fuller","year":"2005","unstructured":"Fuller, J., Millan, W., Dawson, E.: Multi-objective optimisation of bijective s-boxes. New Generation Computing\u00a023, 201\u2013218 (2005)","journal-title":"New Generation Computing"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Laskari, E.C., Meletiou, G.C., Vrahatis, M.N.: Utilizing Evolutionary Computation Methods for the Design of S-Boxes. In: 2006 International Conference on Computational Intelligence and Security, pp. 1299\u20131302 (2006)","DOI":"10.1109\/ICCIAS.2006.295267"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/BFb0053732","volume-title":"Information Security and Privacy","author":"W.L. Millan","year":"1998","unstructured":"Millan, W.L.: How to Improve the Nonlinearity of Bijective S-boxes. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol.\u00a01438, pp. 181\u2013192. Springer, Heidelberg (1998)"},{"key":"20_CR17","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.physleta.2012.01.009","volume":"376","author":"Y. Wang","year":"2012","unstructured":"Wang, Y., Wong, K.-W., Li, C., Li, Y.: A novel method to design S-box based on chaotic map and genetic algorithm. Physics Letters A\u00a0376, 827\u2013833 (2012)","journal-title":"Physics Letters A"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"20_CR20","unstructured":"Schneier, B., Sutherland, P.: Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, Inc. (1995)"},{"key":"20_CR21","doi-asserted-by":"publisher","first-page":"3118","DOI":"10.1016\/j.ins.2008.02.016","volume":"178","author":"A.G. Bafghi","year":"2008","unstructured":"Bafghi, A.G., Safabakhsh, R., Sadeghiyan, B.: Finding the differential characteristics of block ciphers with neural networks. Information Sciences\u00a0178, 3118\u20133132 (2008)","journal-title":"Information Sciences"},{"key":"20_CR22","doi-asserted-by":"publisher","first-page":"170","DOI":"10.4218\/etrij.08.0207.0188","volume":"30","author":"M. Asim","year":"2008","unstructured":"Asim, M., Jeoti, V.: Efficient and simple method for designing chaotic S-boxes. ETRI Journal\u00a030, 170 (2008)","journal-title":"ETRI Journal"},{"key":"20_CR23","doi-asserted-by":"publisher","first-page":"2450","DOI":"10.1016\/j.camwa.2012.05.017","volume":"64","author":"I. Hussain","year":"2012","unstructured":"Hussain, I., Shah, T., Mahmood, H., Gondal, M.: Construction of S8 Liu J S-boxes and their applications. Computers & Mathematics with Applications\u00a064, 2450\u20132458 (2012)","journal-title":"Computers & Mathematics with Applications"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-77086-2_7","volume-title":"Information Systems Security","author":"D. Bhattacharya","year":"2007","unstructured":"Bhattacharya, D., Bansal, N., Banerjee, A., RoyChowdhury, D.: A Near Optimal S-Box Design. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol.\u00a04812, pp. 77\u201390. Springer, Heidelberg (2007)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T02:16:15Z","timestamp":1558836975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}