{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T15:58:16Z","timestamp":1772553496626,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T00:00:00Z","timestamp":1698710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s00521-023-09095-7","type":"journal-article","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T20:02:37Z","timestamp":1698782557000},"page":"1283-1294","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A novel algorithm based on DNA coding for substitution box generation problem"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4096-0458","authenticated-orcid":false,"given":"F\u0131rat","family":"Artu\u011fer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,31]]},"reference":[{"key":"9095_CR1","volume-title":"Handbook of applied cryptography","author":"PC Van Oorschot","year":"1996","unstructured":"Van Oorschot PC, Menezes AJ, Vanstone SA (1996) Handbook of applied cryptography. CRC Press"},{"key":"9095_CR2","unstructured":"Daemen J, Rijmen V, 1998 AES proposal: Rijndael. In: Proc. 1st Adv. Encryption Conf., CA, USA, 1998, pp 1\u201345"},{"key":"9095_CR3","unstructured":"Standard DE (1999). Data encryption standard. Federal Information Processing Standards Publication, 112."},{"issue":"4","key":"9095_CR4","doi-asserted-by":"crossref","first-page":"571","DOI":"10.3390\/sym12040571","volume":"12","author":"F Artu\u011fer","year":"2020","unstructured":"Artu\u011fer F, \u00d6zkaynak F (2020) A novel method for performance improvement of chaos-based substitution boxes. Symmetry 12(4):571","journal-title":"Symmetry"},{"issue":"1","key":"9095_CR5","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.eij.2021.08.002","volume":"23","author":"F Artu\u011fer","year":"2022","unstructured":"Artu\u011fer F, \u00d6zkaynak F (2022) A method for generation of substitution box based on random selection. Egyptian Inform J 23(1):127\u2013135","journal-title":"Egyptian Inform J"},{"issue":"2","key":"9095_CR6","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.chaos.2004.04.023","volume":"23","author":"G Tang","year":"2005","unstructured":"Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fractals 23(2):413\u2013419","journal-title":"Chaos, Solitons Fractals"},{"issue":"5","key":"9095_CR7","doi-asserted-by":"crossref","first-page":"1901","DOI":"10.1016\/S0960-0779(04)00454-0","volume":"23","author":"G Tang","year":"2005","unstructured":"Tang G, Liao X (2005) A method for designing dynamical S-boxes based on discretized chaotic map. Chaos, Solitons Fractals 23(5):1901\u20131909","journal-title":"Chaos, Solitons Fractals"},{"issue":"6","key":"9095_CR8","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1007\/s11760-013-0577-4","volume":"9","author":"M Khan","year":"2015","unstructured":"Khan M, Shah T (2015) An efficient construction of substitution box with fractional chaotic system. SIViP 9(6):1335\u20131338","journal-title":"SIViP"},{"issue":"3","key":"9095_CR9","doi-asserted-by":"crossref","first-page":"2115","DOI":"10.1007\/s11071-018-4478-5","volume":"94","author":"T Ye","year":"2018","unstructured":"Ye T, Zhimao L (2018) Chaotic S-box: six-dimensional fractional Lorenz-Duffing chaotic system and O-shaped path scrambling. Nonlinear Dyn 94(3):2115\u20132126","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"9095_CR10","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","volume":"87","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Zengin A, Pehlivan I, Ka\u00e7ar S (2017) A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn 87(2):1081\u20131094","journal-title":"Nonlinear Dyn"},{"key":"9095_CR11","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2019.124072","volume":"550","author":"F \u00d6zkaynak","year":"2020","unstructured":"\u00d6zkaynak F (2020) On the effect of chaotic system in performance characteristics of chaos based s-box designs. Physica A 550:124072","journal-title":"Physica A"},{"key":"9095_CR12","doi-asserted-by":"crossref","first-page":"1438","DOI":"10.1016\/j.ijleo.2016.11.152","volume":"130","author":"A Belazi","year":"2017","unstructured":"Belazi A, Abd El-Latif AA (2017) A simple yet efficient S-box method based on chaotic sine map. Optik 130:1438\u20131444","journal-title":"Optik"},{"issue":"3","key":"9095_CR13","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1007\/s11071-013-0904-x","volume":"73","author":"M Khan","year":"2013","unstructured":"Khan M, Shah T, Gondal MA (2013) An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn 73(3):1795\u20131801","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"9095_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13319-016-0112-9","volume":"8","author":"G Liu","year":"2017","unstructured":"Liu G (2017) Designing S-box based on 4D\u20134wing hyperchaotic system. 3D Res 8(1):1\u20139","journal-title":"3D Res"},{"issue":"4","key":"9095_CR15","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1007\/s11760-016-1007-1","volume":"11","author":"F \u00d6zkaynak","year":"2017","unstructured":"\u00d6zkaynak F, \u00c7elik V, \u00d6zer AB (2017) A new S-box construction method based on the fractional-order chaotic Chen system. SIViP 11(4):659\u2013664","journal-title":"SIViP"},{"issue":"3","key":"9095_CR16","doi-asserted-by":"crossref","first-page":"2303","DOI":"10.1007\/s11071-012-0621-x","volume":"70","author":"M Khan","year":"2012","unstructured":"Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70(3):2303\u20132311","journal-title":"Nonlinear Dyn"},{"issue":"36","key":"9095_CR17","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.1016\/j.physleta.2010.07.019","volume":"374","author":"F \u00d6zkaynak","year":"2010","unstructured":"\u00d6zkaynak F, \u00d6zer AB (2010) A method for designing strong S-Boxes based on chaotic Lorenz system. Phys Lett A 374(36):3733\u20133738","journal-title":"Phys Lett A"},{"issue":"1","key":"9095_CR18","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1007\/s11071-020-05503-y","volume":"100","author":"D Lambi\u0107","year":"2020","unstructured":"Lambi\u0107 D (2020) A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design. Nonlinear Dyn 100(1):699\u2013711","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"9095_CR19","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s40998-019-00230-6","volume":"44","author":"F \u00d6zkaynak","year":"2020","unstructured":"\u00d6zkaynak F (2020) An analysis and generation toolbox for chaotic substitution boxes: a case study based on chaotic labyrinth rene thomas system. Iran J Sci Technol Trans Electr Eng 44(1):89\u201398","journal-title":"Iran J Sci Technol Trans Electr Eng"},{"issue":"2","key":"9095_CR20","first-page":"181","volume":"2","author":"D Lambi\u0107","year":"2018","unstructured":"Lambi\u0107 D (2018) S-box design method based on improved one-dimensional discrete chaotic map. J Inf Telecommun 2(2):181\u2013191","journal-title":"J Inf Telecommun"},{"key":"9095_CR21","doi-asserted-by":"crossref","unstructured":"\u00d6rs SB, Preneel B, Verbauwhede I (2007) Side-channel analysis attacks on hardware implementations of cryptographic algorithms. Wireless Security and Cryptography-Specifications and Implementations, 213\u2013247","DOI":"10.1201\/9780849387692.ch7"},{"issue":"11","key":"9095_CR22","doi-asserted-by":"crossref","first-page":"e0241890","DOI":"10.1371\/journal.pone.0241890","volume":"15","author":"N Siddiqui","year":"2020","unstructured":"Siddiqui N, Yousaf F, Murtaza F, Ehatisham-ul-Haq M, Ashraf MU, Alghamdi AM, Alfakeeh AS (2020) A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. PLoS ONE 15(11):e0241890","journal-title":"PLoS ONE"},{"key":"9095_CR23","doi-asserted-by":"crossref","first-page":"35682","DOI":"10.1109\/ACCESS.2020.2973679","volume":"8","author":"MSM Malik","year":"2020","unstructured":"Malik MSM, Ali MA, Khan MA, Ehatisham-Ul-Haq M, Shah SNM, Rehman M, Ahmad W (2020) Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices. IEEE Access 8:35682\u201335695","journal-title":"IEEE Access"},{"key":"9095_CR24","first-page":"1","volume":"2020","author":"M Ahmad","year":"2020","unstructured":"Ahmad M, Al-Solami E (2020) Improved 2D discrete hyperchaos mapping with complex behaviour and algebraic structure for strong s-boxes generation. Complexity 2020:1\u201316","journal-title":"Complexity"},{"key":"9095_CR25","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2021.1964727","author":"AV Sokolov","year":"2022","unstructured":"Sokolov AV, Radush VV (2022) A method for synthesis of S-boxes with good avalanche characteristics of component Boolean and quaternary functions. J Discr Math Sci Cryptogr. https:\/\/doi.org\/10.1080\/09720529.2021.1964727","journal-title":"J Discr Math Sci Cryptogr"},{"key":"9095_CR26","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2021.2018112","author":"EV Bakunina","year":"2022","unstructured":"Bakunina EV, Dykyi OV (2022) Synthesis method for S-boxes satisfying the criterion of correlation immunity of Boolean and 4-functions. J Discr Math Sci Cryptogr. https:\/\/doi.org\/10.1080\/09720529.2021.2018112","journal-title":"J Discr Math Sci Cryptogr"},{"issue":"8","key":"9095_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjp\/s13360-020-00666-4","volume":"135","author":"I Hussain","year":"2020","unstructured":"Hussain I (2020) True-chaotic substitution box based on Boolean functions. Eur Phys J Plus 135(8):1\u201317","journal-title":"Eur Phys J Plus"},{"issue":"7","key":"9095_CR28","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1007\/s00521-014-1663-4","volume":"25","author":"M Khan","year":"2014","unstructured":"Khan M, Shah T (2014) A novel image encryption technique based on H\u00e9non chaotic map and S8 symmetric group. Neural Comput Appl 25(7):1717\u20131722","journal-title":"Neural Comput Appl"},{"issue":"3","key":"9095_CR29","doi-asserted-by":"crossref","first-page":"2057","DOI":"10.1007\/s11277-021-08981-4","volume":"122","author":"A Razaq","year":"2022","unstructured":"Razaq A, Ahmad M, Yousaf A, Alawida M, Ullah A, Shuaib U (2022) A group theoretic construction of large number of AES-like substitution-boxes. Wireless Pers Commun 122(3):2057\u20132080","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"9095_CR30","doi-asserted-by":"crossref","first-page":"4163","DOI":"10.1007\/s11042-021-11635-z","volume":"81","author":"A Razaq","year":"2022","unstructured":"Razaq A, Akhter S, Yousaf A, Shuaib U, Ahmad M (2022) A group theoretic construction of highly nonlinear substitution box and its applications in image encryption. Multimed Tools Appl 81(3):4163\u20134184","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"9095_CR31","doi-asserted-by":"crossref","first-page":"7045","DOI":"10.1007\/s00521-019-04207-8","volume":"32","author":"A Anees","year":"2020","unstructured":"Anees A, Chen YPP (2020) Designing secure substitution boxes based on permutation of symmetric group. Neural Comput Appl 32(11):7045\u20137056","journal-title":"Neural Comput Appl"},{"issue":"4","key":"9095_CR32","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1007\/s11277-022-09524-1","volume":"124","author":"B Arshad","year":"2022","unstructured":"Arshad B, Siddiqui N, Hussain Z, Ehatisham-ul-Haq M (2022) A Novel Scheme for Designing Secure Substitution Boxes (S-Boxes) Based on Mobius Group and Finite Field. Wireless Pers Commun 124(4):3527\u20133548","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"9095_CR33","doi-asserted-by":"crossref","first-page":"3165","DOI":"10.1007\/s11277-020-07841-x","volume":"116","author":"A Razaq","year":"2021","unstructured":"Razaq A, Ullah A, Alolaiyan H, Yousaf A (2021) A novel group theoretic and graphical approach for designing cryptographically strong nonlinear components of block ciphers. Wireless Pers Commun 116(4):3165\u20133190","journal-title":"Wireless Pers Commun"},{"key":"9095_CR34","doi-asserted-by":"crossref","unstructured":"Kuznetsov A, Romeo L, Poluyanenko N, Kandiy S, Kuznetsova K (2022). Optimizing Hill Climbing Algorithm Parameters for Generation of Cryptographically Strong S-Boxes","DOI":"10.21203\/rs.3.rs-1657863\/v1"},{"issue":"5","key":"9095_CR35","doi-asserted-by":"crossref","first-page":"7333","DOI":"10.1007\/s11042-020-10048-8","volume":"80","author":"HS Alhadawi","year":"2021","unstructured":"Alhadawi HS, Majid MA, Lambi\u0107 D, Ahmad M (2021) A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed Tools Appl 80(5):7333\u20137350","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"9095_CR36","doi-asserted-by":"crossref","first-page":"7201","DOI":"10.1007\/s00521-018-3557-3","volume":"31","author":"HA Ahmed","year":"2019","unstructured":"Ahmed HA, Zolkipli MF, Ahmad M (2019) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl 31(11):7201\u20137210","journal-title":"Neural Comput Appl"},{"key":"9095_CR37","volume":"55","author":"HS Alhadawi","year":"2020","unstructured":"Alhadawi HS, Lambi\u0107 D, Zolkipli MF, Ahmad M (2020) Globalized firefly algorithm and chaos for designing substitution box. J Inf Secur Appl 55:102671","journal-title":"J Inf Secur Appl"},{"issue":"23","key":"9095_CR38","doi-asserted-by":"crossref","first-page":"16641","DOI":"10.1007\/s00521-021-06260-8","volume":"33","author":"KZ Zamli","year":"2021","unstructured":"Zamli KZ, Kader A, Din F, Alhadawi HS (2021) Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization. Neural Comput Appl 33(23):16641\u201316658","journal-title":"Neural Comput Appl"},{"issue":"4","key":"9095_CR39","doi-asserted-by":"crossref","first-page":"1028","DOI":"10.1016\/j.chaos.2006.08.003","volume":"36","author":"G Chen","year":"2008","unstructured":"Chen G (2008) A novel heuristic method for obtaining S-boxes. Chaos, Solitons Fractals 36(4):1028\u20131036","journal-title":"Chaos, Solitons Fractals"},{"key":"9095_CR40","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1016\/j.cjph.2021.03.029","volume":"72","author":"LS Khan","year":"2021","unstructured":"Khan LS, Hazzazi MM, Khan M, Jamal SS (2021) A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes. Chin J Phys 72:558\u2013574","journal-title":"Chin J Phys"},{"key":"9095_CR41","doi-asserted-by":"crossref","first-page":"116132","DOI":"10.1109\/ACCESS.2020.3004449","volume":"8","author":"M Ahmad","year":"2020","unstructured":"Ahmad M, Khaja IA, Baz A, Alhakami H, Alhakami W (2020) Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications. IEEE Access 8:116132\u2013116147","journal-title":"IEEE Access"},{"issue":"10","key":"9095_CR42","doi-asserted-by":"crossref","first-page":"5111","DOI":"10.1007\/s00521-020-05304-9","volume":"33","author":"N Hematpour","year":"2021","unstructured":"Hematpour N, Ahadpour S (2021) Execution examination of chaotic S-box dependent on improved PSO algorithm. Neural Comput Appl 33(10):5111\u20135133","journal-title":"Neural Comput Appl"},{"key":"9095_CR43","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.ins.2020.03.025","volume":"523","author":"Y Wang","year":"2020","unstructured":"Wang Y, Zhang Z, Zhang LY, Feng J, Gao J, Lei P (2020) A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Inf Sci 523:152\u2013166","journal-title":"Inf Sci"},{"issue":"6\u20137","key":"9095_CR44","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1016\/j.physleta.2012.01.009","volume":"376","author":"Y Wang","year":"2012","unstructured":"Wang Y, Wong KW, Li C, Li Y (2012) A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A 376(6\u20137):827\u2013833","journal-title":"Phys Lett A"},{"issue":"22","key":"9095_CR45","doi-asserted-by":"crossref","first-page":"20203","DOI":"10.1007\/s00521-022-07589-4","volume":"34","author":"F Artu\u011fer","year":"2022","unstructured":"Artu\u011fer F, \u00d6zkaynak F (2022) SBOX-CGA: substitution box generator based on chaos and genetic algorithm. Neural Comput Appl 34(22):20203\u201320211","journal-title":"Neural Comput Appl"},{"key":"9095_CR46","doi-asserted-by":"crossref","first-page":"10898","DOI":"10.1109\/ACCESS.2022.3144458","volume":"10","author":"M Kang","year":"2022","unstructured":"Kang M, Wang M (2022) New genetic operators for developing s-boxes with low boomerang uniformity. IEEE Access 10:10898\u201310906","journal-title":"IEEE Access"},{"issue":"2","key":"9095_CR47","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1007\/s11071-016-3295-y","volume":"88","author":"T Farah","year":"2017","unstructured":"Farah T, Rhouma R, Belghith S (2017) A novel method for designing S-box based on chaotic map and teaching\u2013learning-based optimization. Nonlinear Dyn 88(2):1059\u20131074","journal-title":"Nonlinear Dyn"},{"issue":"7","key":"9095_CR48","doi-asserted-by":"crossref","first-page":"717","DOI":"10.3390\/e22070717","volume":"22","author":"M Ahmad","year":"2020","unstructured":"Ahmad M, Al-Solami E (2020) Evolving dynamic S-boxes using fractional-order hopfield neural network based scheme. Entropy 22(7):717","journal-title":"Entropy"},{"key":"9095_CR49","doi-asserted-by":"crossref","first-page":"115305","DOI":"10.1016\/j.eswa.2021.115305","volume":"182","author":"KZ Zamli","year":"2021","unstructured":"Zamli KZ (2021) Optimizing S-box generation based on the adaptive agent heroes and cowards algorithm. Expert Syst Appl 182:115305","journal-title":"Expert Syst Appl"},{"key":"9095_CR50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/9389065","volume":"2018","author":"AA Alzaidi","year":"2018","unstructured":"Alzaidi AA, Ahmad M, Ahmed HS, Solami EA (2018) Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map. Complexity 2018:1\u201316","journal-title":"Complexity"},{"key":"9095_CR51","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1016\/j.procs.2015.07.394","volume":"57","author":"M Ahmad","year":"2015","unstructured":"Ahmad M, Bhatia D, Hassan Y (2015) A novel ant colony optimization based scheme for substitution box design. Procedia Comput Sci 57:572\u2013580","journal-title":"Procedia Comput Sci"},{"key":"9095_CR52","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6969312","author":"Y Tian","year":"2017","unstructured":"Tian Y, Lu Z (2017) Chaotic S-box: Intertwining logistic map and bacterial foraging optimization. Math Probl Eng. https:\/\/doi.org\/10.1155\/2017\/6969312","journal-title":"Math Probl Eng"},{"issue":"4","key":"9095_CR53","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1016\/j.icte.2022.11.005","volume":"9","author":"KZ Zamli","year":"2022","unstructured":"Zamli KZ, Din F, Alhadawi HS, Khalid S, Alsolai H, Nour MK, Assam M (2022) Exploiting an Elitist Barnacles Mating Optimizer implementation for substitution box optimization. ICT Express. 9(4):619\u2013627","journal-title":"ICT Express."},{"issue":"5","key":"9095_CR54","doi-asserted-by":"crossref","first-page":"6943","DOI":"10.1007\/s11042-022-13612-6","volume":"82","author":"H Khan","year":"2023","unstructured":"Khan H, Hazzazi MM, Jamal SS, Hussain I, Khan M (2023) New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes. Multimed Tools Appl 82(5):6943\u20136964","journal-title":"Multimed Tools Appl"},{"key":"9095_CR55","doi-asserted-by":"crossref","first-page":"10449","DOI":"10.1007\/s00521-023-08243-3","volume":"35","author":"KZ Zamli","year":"2023","unstructured":"Zamli KZ, Din F, Alhadawi HS (2023) Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization. Neural Comput Appl 35:10449\u201310471","journal-title":"Neural Comput Appl"},{"key":"9095_CR56","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1007\/s11277-023-10456-7","volume":"131","author":"F Artu\u011fer","year":"2023","unstructured":"Artu\u011fer F (2023) A new S-box generator algorithm based on 3D chaotic maps and whale optimization algorithm. Wireless Pers Commun 131:835\u2013853","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"9095_CR57","doi-asserted-by":"crossref","first-page":"1116","DOI":"10.1007\/s00034-017-0592-8","volume":"37","author":"BR Gangadari","year":"2018","unstructured":"Gangadari BR, Ahamed SR (2018) Programmable cellular automata-based low-power architecture to S-box: an application to WBAN. Circuits Systems Signal Process 37(3):1116\u20131133","journal-title":"Circuits Systems Signal Process"},{"key":"9095_CR58","doi-asserted-by":"crossref","first-page":"116167","DOI":"10.1109\/ACCESS.2022.3218062","volume":"10","author":"A Haque","year":"2022","unstructured":"Haque A, Abdulhussein TA, Ahmad M, Falah MW, Abd El-Latif AA (2022) A strong hybrid S-Box scheme based on chaos, 2D cellular automata and algebraic structure. IEEE Access 10:116167\u2013116181","journal-title":"IEEE Access"},{"issue":"3","key":"9095_CR59","doi-asserted-by":"crossref","first-page":"2003","DOI":"10.1007\/s11071-018-4471-z","volume":"94","author":"JA Aboytes-Gonz\u00e1lez","year":"2018","unstructured":"Aboytes-Gonz\u00e1lez JA, Murgu\u00eda JS, Mej\u00eda-Carlos M, Gonz\u00e1lez-Aguilar H, Ram\u00edrez-Torres MT (2018) Design of a strong S-box based on a matrix approach. Nonlinear Dyn 94(3):2003\u20132012","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"9095_CR60","doi-asserted-by":"crossref","first-page":"443","DOI":"10.3390\/sym14030443","volume":"14","author":"W Alexan","year":"2022","unstructured":"Alexan W, ElBeltagy M, Aboshousha A (2022) Rgb image encryption through cellular automata, s-box and the lorenz system. Symmetry 14(3):443","journal-title":"Symmetry"},{"issue":"1","key":"9095_CR61","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s12095-018-0311-8","volume":"11","author":"L Mariot","year":"2019","unstructured":"Mariot L, Picek S, Leporati A, Jakobovic D (2019) Cellular automata based S-boxes. Cryptogr Commun 11(1):41\u201362","journal-title":"Cryptogr Commun"},{"key":"9095_CR62","doi-asserted-by":"crossref","unstructured":"Szaban M, Seredynski F (2008) Application of cellular automata to create S-box functions. In: 2008 IEEE International Symposium on Parallel and Distributed Processing (pp. 1\u20137). IEEE.","DOI":"10.1109\/IPDPS.2008.4536378"},{"key":"9095_CR63","doi-asserted-by":"crossref","first-page":"66409","DOI":"10.1109\/ACCESS.2022.3183990","volume":"10","author":"HAMA Basha","year":"2022","unstructured":"Basha HAMA, Mohra ASS, Diab TOM, El Sobky WI (2022) Efficient image encryption based on new substitution box using DNA coding and bent function. IEEE Access 10:66409\u201366429","journal-title":"IEEE Access"},{"key":"9095_CR64","doi-asserted-by":"crossref","first-page":"14284","DOI":"10.1109\/ACCESS.2021.3052161","volume":"9","author":"AG Mohamed","year":"2021","unstructured":"Mohamed AG, Korany NO, El-Khamy SE (2021) New DNA coded fuzzy based (DNAFZ) S-boxes: application to robust image encryption using hyper chaotic maps. IEEE Access 9:14284\u201314305","journal-title":"IEEE Access"},{"key":"9095_CR65","doi-asserted-by":"crossref","unstructured":"Kadhim FA, Majeed GHA, Ali RS (2016) Proposal new s-box depending on DNA computing and mathematical operations. In: 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA) (pp. 1\u20136). IEEE","DOI":"10.1109\/AIC-MITCSA.2016.7759926"},{"issue":"1","key":"9095_CR66","first-page":"331","volume":"16","author":"AK Farhan","year":"2020","unstructured":"Farhan AK, Ali RS, Yassein HR, Al-Saidi NMG, Abdul-Majeed GH (2020) A new approach to generate multi S-boxes based on RNA computing. Int J Innov Comput Inf Control 16(1):331\u2013348","journal-title":"Int J Innov Comput Inf Control"},{"issue":"4","key":"9095_CR67","first-page":"1","volume":"15","author":"AH Al-Wattar","year":"2015","unstructured":"Al-Wattar AH, Mahmod R, Zukarnain ZA, Udzir NI (2015) A new DNA-based S-box. Int J Eng Technol 15(4):1\u20139","journal-title":"Int J Eng Technol"},{"issue":"1","key":"9095_CR68","first-page":"32","volume":"4","author":"AS Al-Wattar","year":"2015","unstructured":"Al-Wattar AS, Mahmod R, Zukarnain ZA, Udzir NI (2015) Generating a new S-Box inspired by biological DNA. Int J Comput Sci Appl 4(1):32\u201342","journal-title":"Int J Comput Sci Appl"},{"key":"9095_CR69","doi-asserted-by":"crossref","unstructured":"Webster AF, Tavares SE (1985) On the design of S-boxes. In: Conference on the theory and application of cryptographic techniques (pp 523\u2013534). Springer, Berlin, Heidelberg","DOI":"10.1007\/3-540-39799-X_41"},{"issue":"1","key":"9095_CR70","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3\u201372","journal-title":"J Cryptol"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09095-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-09095-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09095-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T08:09:31Z","timestamp":1704442171000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-09095-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,31]]},"references-count":70,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["9095"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-09095-7","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,31]]},"assertion":[{"value":"9 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}