{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:57Z","timestamp":1725771297504},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_48","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T09:26:22Z","timestamp":1391765182000},"page":"540-550","source":"Crossref","is-referenced-by-count":17,"title":["A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique"],"prefix":"10.1007","author":[{"given":"Musheer","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Parvez Mahmood","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mohd Zeeshan","family":"Ansari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Systems Technical Journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell Systems Technical Journal"},{"key":"48_CR2","unstructured":"Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of applied cryptography. CRC Press (1997)"},{"key":"48_CR3","unstructured":"Ahmad, M.: Design and FPGA implementation of LFSR based data encryption circuit for secure communication, M.Tech Dissertation, AMU Aligarh (2008)"},{"key":"48_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/3-540-46416-6_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"M.H. Dawson","year":"1991","unstructured":"Dawson, M.H., Tavares, S.E.: An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 352\u2013367. Springer, Heidelberg (1991)"},{"issue":"4","key":"48_CR5","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.chaos.2006.08.003","volume":"36","author":"G. Chen","year":"2008","unstructured":"Chen, G.: A novel heuristic method for obtaining S-boxes. Chaos, Solitons & Fractals\u00a036(4), 1028\u20131036 (2008)","journal-title":"Chaos, Solitons & Fractals"},{"issue":"7","key":"48_CR6","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.ipl.2013.01.002","volume":"113","author":"O. Karaahmetoglu","year":"2013","unstructured":"Karaahmetoglu, O., Sakalli, M.T., Bulus, E., Tutanescu, I.: A new method to determine algebraic expression of power mapping based S-boxes. Information Processing Letters\u00a0113(7), 229\u2013235 (2013)","journal-title":"Information Processing Letters"},{"issue":"2","key":"48_CR7","first-page":"27","volume":"8","author":"M. Szaban","year":"2008","unstructured":"Szaban, M., Seredynski, F.: Designing cryptographically strong S-boxes with the use of cellular automata. Annales UMCS Informatica Lublin-Polonia Sectio AI\u00a08(2), 27\u201341 (2008)","journal-title":"Annales UMCS Informatica Lublin-Polonia Sectio AI"},{"key":"48_CR8","volume-title":"Cryptographic Boolean Functions and Applications","author":"T.W. Cusick","year":"2009","unstructured":"Cusick, T.W., Stanica, P.: Cryptographic Boolean Functions and Applications. Elsevier, Amsterdam (2009)"},{"issue":"16","key":"48_CR9","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1016\/j.disc.2006.03.055","volume":"306","author":"A.M. Youssef","year":"2006","unstructured":"Youssef, A.M., Tavares, S.E., Gong, G.: On some probabilistic approximations for AES-like S-boxes. Discrete Mathematics\u00a0306(16), 2016\u20132020 (2006)","journal-title":"Discrete Mathematics"},{"key":"48_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88757-9","volume-title":"Algebraic Cryptanalysis","author":"G.V. Bard","year":"2009","unstructured":"Bard, G.V.: Algebraic Cryptanalysis. Springer, Berlin (2009)"},{"issue":"2","key":"48_CR11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G. Jakimoski","year":"2001","unstructured":"Jakimoski, G., Kocarev, L.: Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Transaction on Circuits Systems\u00a048(2), 163\u2013169 (2001)","journal-title":"IEEE Transaction on Circuits Systems"},{"issue":"3","key":"48_CR12","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.chaos.2005.10.022","volume":"31","author":"G. Chen","year":"2007","unstructured":"Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos, Solitons & Fractals\u00a031(3), 571\u2013577 (2007)","journal-title":"Chaos, Solitons & Fractals"},{"issue":"1","key":"48_CR13","doi-asserted-by":"publisher","first-page":"170","DOI":"10.4218\/etrij.08.0207.0188","volume":"30","author":"M. Asim","year":"2008","unstructured":"Asim, M., Jeoti, V.: Efficient and simple method for designing chaotic S-boxes. ETRI Journal\u00a030(1), 170\u2013172 (2008)","journal-title":"ETRI Journal"},{"issue":"4","key":"48_CR14","doi-asserted-by":"publisher","first-page":"2582","DOI":"10.1016\/j.chaos.2009.03.201","volume":"42","author":"R. Yin","year":"2009","unstructured":"Yin, R., Yuan, J., Wang, J., Shan, X., Wang, X.: Designing key-dependent chaotic S-box with large key space. Chaos, Solitons & Fractals\u00a042(4), 2582\u20132589 (2009)","journal-title":"Chaos, Solitons & Fractals"},{"issue":"7","key":"48_CR15","doi-asserted-by":"publisher","first-page":"3089","DOI":"10.1016\/j.cnsns.2008.12.005","volume":"14","author":"Y. Wang","year":"2009","unstructured":"Wang, Y., Wong, K.W., Liao, X., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Communications in Nonlinear Science and Numerical Simulations\u00a014(7), 3089\u20133099 (2009)","journal-title":"Communications in Nonlinear Science and Numerical Simulations"},{"issue":"36","key":"48_CR16","doi-asserted-by":"publisher","first-page":"3733","DOI":"10.1016\/j.physleta.2010.07.019","volume":"374","author":"F. \u00d6zkaynak","year":"2010","unstructured":"\u00d6zkaynak, F., \u00d6zer, A.B.: A method for designing strong S-boxes based on chaotic Lorenz system. Physics Letters A\u00a0374(36), 3733\u20133738 (2010)","journal-title":"Physics Letters A"},{"issue":"3","key":"48_CR17","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s11071-013-0987-4","volume":"74","author":"F. \u00d6zkaynak","year":"2013","unstructured":"\u00d6zkaynak, F., Yavuz, S.: Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dynamics\u00a074(3), 551\u2013557 (2013)","journal-title":"Nonlinear Dynamics"},{"key":"48_CR18","unstructured":"Fisher, R.A., Yates, F.: Statistical tables for biological, agricultural and medical research, 3rd edn., pp. 26\u201327. London Oliver & Boyd. (1938)"},{"issue":"7","key":"48_CR19","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1145\/364520.364540","volume":"7","author":"R. Durstenfeld","year":"1964","unstructured":"Durstenfeld, R.: Algorithm 235: Random permutation. Communications of the ACM\u00a07(7), 420 (1964)","journal-title":"Communications of the ACM"},{"key":"48_CR20","unstructured":"Knuth, D.E.: Seminumerical algorithms. In: The Art of Computer Programming, vol.\u00a02, pp. 124\u2013125. Addison\u2013Wesley (1969)"},{"issue":"10","key":"48_CR21","doi-asserted-by":"publisher","first-page":"3119","DOI":"10.1142\/S0218127405014052","volume":"15","author":"S. Li","year":"2005","unstructured":"Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos\u00a015(10), 3119\u20133151 (2005)","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"9","key":"48_CR22","doi-asserted-by":"publisher","first-page":"90506","DOI":"10.1088\/1674-1056\/21\/9\/090506","volume":"21","author":"Y. Liu","year":"2012","unstructured":"Liu, Y., Tong, X.J.: A new pseudorandom number generator based on complex number chaotic equation. Chinese Physics B\u00a021(9), 90506\u201390508 (2012)","journal-title":"Chinese Physics B"},{"issue":"8","key":"48_CR23","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G. Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos\u00a016(8), 2129 (2006)","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"2","key":"48_CR24","first-page":"539","volume":"52","author":"H. Hermassi","year":"2013","unstructured":"Hermassi, H., Rhouma, R., Belghith, S.: Improvement of an image encryption algorithm based on hyper-chaos. Telecommunication Systems\u00a052(2), 539\u2013549 (2013)","journal-title":"Telecommunication Systems"},{"issue":"1","key":"48_CR25","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.ins.2011.09.008","volume":"186","author":"A. Kanso","year":"2012","unstructured":"Kanso, A., Yahyaoui, H., Almulla, M.: Keyed hash function based on a chaotic map. Information Sciences\u00a0186(1), 249\u2013264 (2012)","journal-title":"Information Sciences"},{"issue":"1","key":"48_CR26","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"Journal of Cryptology"},{"key":"48_CR27","unstructured":"Dalai, D.K.: On some necessary conditions of boolean functions to resist algebraic attacks, PhD thesis, ISI Kolkata (2006)"},{"key":"48_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/3-540-39799-X_41","volume-title":"Advances in Cryptology","author":"A.F. Webster","year":"1986","unstructured":"Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 523\u2013534. Springer, Heidelberg (1986)"},{"issue":"11","key":"48_CR29","first-page":"2389","volume":"13","author":"I. Hussain","year":"2011","unstructured":"Hussain, I., Shah, T., Gondal, M.A., Khan, W.A.: Construction of cryptographically strong 8x8 S-boxes. World Applied Sciences Journal\u00a013(11), 2389\u20132395 (2011)","journal-title":"World Applied Sciences Journal"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T02:19:14Z","timestamp":1558837154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_48","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}