{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T15:25:17Z","timestamp":1776525917863,"version":"3.51.2"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-025-05867-z","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:32:56Z","timestamp":1767713576000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel nonlinear component of block cipher and hybrid RGB image encryption over Gaussian ring and Mordell elliptic curve"],"prefix":"10.1007","volume":"29","author":[{"given":"Muhammad","family":"Sajjad","sequence":"first","affiliation":[]},{"given":"Maha","family":"Alammari","sequence":"additional","affiliation":[]},{"given":"Robinson-Julian","family":"Serna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"key":"5867_CR1","unstructured":"Stallings, W.: Cryptography and network security: principles and practices. (2006)"},{"key":"5867_CR2","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC (2018)","DOI":"10.1201\/9780429466335"},{"key":"5867_CR3","unstructured":"Davidoff, G.P., Sarnak, P., Valette, A.: Elementary number theory, group theory, and Ramanujan graphs (Vol. 55, No. 1, pp. 45\u201380). Cambridge: Cambridge university press. (2003)"},{"key":"5867_CR4","doi-asserted-by":"publisher","first-page":"99546","DOI":"10.1109\/ACCESS.2023.3313180","volume":"11","author":"JA Aboytes-Gonz\u00e1lez","year":"2023","unstructured":"Aboytes-Gonz\u00e1lez, J.A., Soubervielle-Montalvo, C., Campos-Cant\u00f3n, I., Perez-Cham, O.E., Ram\u00edrez-Torres, M.T.: Method to improve the cryptographic properties of s-boxes. IEEE Access. 11, 99546\u201399557 (2023)","journal-title":"IEEE Access."},{"issue":"1","key":"5867_CR5","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","volume":"27","author":"M Kaur","year":"2020","unstructured":"Kaur, M., Kumar, V.: A comprehensive review on image encryption techniques. Archives of Computational Methods in Engineering 27(1), 15\u201343 (2020)","journal-title":"Archives of Computational Methods in Engineering"},{"key":"5867_CR6","unstructured":"Ireland, K., Rosen, M.: A Classical Introduction To Modern Number Theory, vol. 84. Springer Science & Business Media (2013)"},{"key":"5867_CR7","doi-asserted-by":"crossref","first-page":"xx","DOI":"10.1007\/978-0-387-09494-6","volume-title":"The Arithmetic of Elliptic Curves","author":"JH Silverman","year":"2009","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves, vol. 106, pp. xx\u2013513. Springer, New York (2009)"},{"issue":"6","key":"5867_CR8","doi-asserted-by":"publisher","first-page":"5837","DOI":"10.1007\/s11071-024-10541-x","volume":"113","author":"M Zhao","year":"2025","unstructured":"Zhao, M., Luo, Y., Yuan, Z., Li, L.: A fast color image encryption scheme based on the new chaotic structure and dynamic strong S-boxes. Nonlinear Dyn. 113(6), 5837\u20135863 (2025)","journal-title":"Nonlinear Dyn."},{"key":"5867_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2021.168548","volume":"253","author":"S Deb","year":"2022","unstructured":"Deb, S., Behera, P.K.: Design of key-dependent bijective S-Boxes for color image cryptosystem. Optik 253, 168548 (2022)","journal-title":"Optik"},{"issue":"21","key":"5867_CR10","doi-asserted-by":"publisher","first-page":"19463","DOI":"10.1007\/s11071-024-10003-4","volume":"112","author":"R Ali","year":"2024","unstructured":"Ali, R., Ali, J., Ping, P., Jamil, M.K.: A novel S-box generator using Frobenius automorphism and its applications in image encryption. Nonlinear Dyn. 112(21), 19463\u201319486 (2024)","journal-title":"Nonlinear Dyn."},{"issue":"8","key":"5867_CR11","doi-asserted-by":"publisher","first-page":"6695","DOI":"10.1007\/s11071-024-09353-w","volume":"112","author":"C Luo","year":"2024","unstructured":"Luo, C., Wang, Y., Fu, Y., Zhou, P., Wang, M.: Constructing dynamic S-boxes based on chaos and irreducible polynomials for image encryption. Nonlinear Dyn. 112(8), 6695\u20136713 (2024)","journal-title":"Nonlinear Dyn."},{"issue":"08","key":"5867_CR12","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127425500968","volume":"35","author":"X Li","year":"2025","unstructured":"Li, X., Liu, H.: Constructing Keyed Strong S-Boxes with High Nonlinearity Based on a 2D-Hyperchaotic Map and Elliptic Curve. International Journal of Bifurcation and Chaos 35(08), 2550096 (2025)","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"5867_CR13","doi-asserted-by":"publisher","first-page":"115952","DOI":"10.1016\/j.chaos.2024.115952","volume":"191","author":"AM Garipcan","year":"2025","unstructured":"Garipcan, A.M., Aydin, Y., \u00d6zkaynak, F.: An efficient 2D hyper chaos and DNA encoding-based s-box generation method using chaotic evolutionary improvement algorithm for nonlinearity. Chaos Solitons Fractals. 191, 115952 (2025)","journal-title":"Chaos Solitons Fractals"},{"key":"5867_CR14","doi-asserted-by":"publisher","first-page":"2303","DOI":"10.1007\/s11071-012-0621-x","volume":"70","author":"M Khan","year":"2012","unstructured":"Khan, M., Shah, T., Mahmood, H., Gondal, M.A., Hussain, I.: A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn. 70, 2303\u20132311 (2012)","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"5867_CR15","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.ffa.2005.07.003","volume":"13","author":"C Carlet","year":"2007","unstructured":"Carlet, C., Ding, C.: Nonlinearities of S-boxes. Finite fields and their applications 13(1), 121\u2013135 (2007)","journal-title":"Finite fields and their applications"},{"key":"5867_CR16","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1016\/j.ins.2021.07.036","volume":"576","author":"F Artu\u011fer","year":"2021","unstructured":"Artu\u011fer, F., \u00d6zkaynak, F.: An effective method to improve nonlinearity value of substitution boxes based on random selection. Inf. Sci. 576, 577\u2013588 (2021)","journal-title":"Inf. Sci."},{"issue":"3","key":"5867_CR17","doi-asserted-by":"publisher","first-page":"3659","DOI":"10.32604\/cmc.2023.039013","volume":"77","author":"MM Hazzazi","year":"2023","unstructured":"Hazzazi, M.M., Sajjad, M., Bassfar, Z., Shah, T., Albakri, A.: Nonlinear Components of a Block Cipher over Eisenstein Integers. Computers, Materials & Continua 77(3), 3659\u20133675 (2023)","journal-title":"Computers, Materials & Continua"},{"issue":"9","key":"5867_CR18","doi-asserted-by":"publisher","first-page":"21089","DOI":"10.3934\/math.20231074","volume":"8","author":"M Sajjad","year":"2023","unstructured":"Sajjad, M., Shah, T., Alsaud, H., Alammari, M.: Designing pair of nonlinear components of a block cipher over quaternion integers. AIMS Mathematics 8(9), 21089\u201321105 (2023)","journal-title":"AIMS Mathematics"},{"key":"5867_CR19","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s11277-018-5698-1","volume":"101","author":"U Hayat","year":"2018","unstructured":"Hayat, U., Azam, N.A., Asif, M.: A method of generating 8\u00d7 8 substitution boxes based on elliptic curves. Wireless Personal Communications 101, 439\u2013451 (2018)","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"5867_CR20","doi-asserted-by":"publisher","first-page":"6785","DOI":"10.1016\/j.aej.2021.12.023","volume":"61","author":"G Ye","year":"2022","unstructured":"Ye, G., Liu, M., Wu, M.: Double image encryption algorithm based on compressive sensing and elliptic curve. Alexandria Eng. J. 61(9), 6785\u20136795 (2022)","journal-title":"Alexandria Eng. J."},{"key":"5867_CR21","doi-asserted-by":"publisher","first-page":"70025","DOI":"10.1109\/ACCESS.2018.2879844","volume":"6","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Wang, X.: Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access. 6, 70025\u201370034 (2018)","journal-title":"IEEE Access."},{"key":"5867_CR22","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.035347","author":"M Sajjad","year":"2023","unstructured":"Sajjad, M., Shah, T., Serna, R.J.: Designing Pair of Nonlinear Components of a Block Cipher over Gaussian Integers. Computers, Materials & Continua 75, 5287\u20135305 (2023). https:\/\/doi.org\/10.32604\/cmc.2023.035347","journal-title":"Computers, Materials &amp; Continua"},{"key":"5867_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e30353","author":"M Sajjad","year":"2024","unstructured":"Sajjad, M., Shah, T., ul Haq, T., Almutairi, B., Xin, Q.: SPN based RGB image encryption over Gaussian integers. Heliyon 10, 1\u201317 (2024). https:\/\/doi.org\/10.1016\/j.heliyon.2024.e30353","journal-title":"Heliyon"},{"issue":"1","key":"5867_CR24","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-89993-z","volume":"15","author":"M Sajjad","year":"2025","unstructured":"Sajjad, M., Shah, T., Hamza, R., Almutairi, B., Serna, R.J.: Multiple color images security by SPN over the residue classes of Gaussian integer. Scientific Reports 15(1), 6425 (2025)","journal-title":"Scientific Reports"},{"key":"5867_CR25","doi-asserted-by":"publisher","first-page":"194289","DOI":"10.1109\/ACCESS.2020.3032403","volume":"8","author":"S Ibrahim","year":"2020","unstructured":"Ibrahim, S., Alharbi, A.: Efficient image encryption scheme using henon map, dynamic S-boxes and elliptic curve cryptography. IEEE Access. 8, 194289\u2013194302 (2020)","journal-title":"IEEE Access."},{"key":"5867_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103793","volume":"83","author":"LD Singh","year":"2024","unstructured":"Singh, L.D., Lahoty, A., Devi, C., Dey, D., Saikai, P., Devi, K.S., Singh, K.M.: Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system. Journal of Information Security and Applications 83, 103793 (2024)","journal-title":"Journal of Information Security and Applications"},{"issue":"1","key":"5867_CR27","volume":"2021","author":"G Murtaza","year":"2021","unstructured":"Murtaza, G., Azam, N.A., Hayat, U.: Designing an Efficient and Highly Dynamic Substitution-Box Generator for Block Ciphers Based on Finite Elliptic Curves. Security and Communication Networks 2021(1), 3367521 (2021)","journal-title":"Security and Communication Networks"},{"issue":"9","key":"5867_CR28","doi-asserted-by":"publisher","first-page":"8887","DOI":"10.1007\/s13369-021-05666-9","volume":"46","author":"U Hayat","year":"2021","unstructured":"Hayat, U., Azam, N.A., Gallegos-Ruiz, H.R., Naz, S., Batool, L.: A truly dynamic substitution box generator for block ciphers based on elliptic curves over finite rings. Arabian Journal for Science and Engineering 46(9), 8887\u20138899 (2021)","journal-title":"Arabian Journal for Science and Engineering"},{"issue":"10","key":"5867_CR29","doi-asserted-by":"publisher","first-page":"1378","DOI":"10.1631\/FITEE.1800434","volume":"20","author":"NA Azam","year":"2019","unstructured":"Azam, N.A., Hayat, U., Ullah, I.: Efficient construction of a substitution box based on a Mordell elliptic curve over a finite field. Frontiers of Information Technology & Electronic Engineering 20(10), 1378\u20131389 (2019)","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"key":"5867_CR30","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.sigpro.2018.10.011","volume":"155","author":"U Hayat","year":"2019","unstructured":"Hayat, U., Azam, N.A.: A novel image encryption scheme based on an elliptic curve. Signal Processing 155, 391\u2013402 (2019)","journal-title":"Signal Processing"},{"issue":"1","key":"5867_CR31","volume":"2018","author":"NA Azam","year":"2018","unstructured":"Azam, N.A., Hayat, U., Ullah, I.: An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization. Security and communication networks 2018(1), 3421725 (2018)","journal-title":"Security and communication networks"},{"issue":"04","key":"5867_CR32","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418500475","volume":"28","author":"Q Yin","year":"2018","unstructured":"Yin, Q., Wang, C.: A new chaotic image encryption scheme using breadth-first search and dynamic diffusion. International Journal of Bifurcation and Chaos 28(04), 1850047 (2018)","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"5867_CR33","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.optlaseng.2015.03.022","volume":"73","author":"XY Wang","year":"2015","unstructured":"Wang, X.Y., Zhang, Y.Q., Bao, X.M.: A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering 73, 53\u201361 (2015)","journal-title":"Optics and Lasers in Engineering"},{"key":"5867_CR34","doi-asserted-by":"publisher","first-page":"38507","DOI":"10.1109\/ACCESS.2019.2906052","volume":"7","author":"Y Luo","year":"2019","unstructured":"Luo, Y., Ouyang, X., Liu, J., Cao, L.: An image encryption method based on elliptic curve elgamal encryption and chaotic systems. IEEE Access. 7, 38507\u201338522 (2019)","journal-title":"IEEE Access."},{"issue":"2","key":"5867_CR35","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.11591\/ijece.v11i2.pp1293-1302","volume":"11","author":"ZK Obaidand","year":"2021","unstructured":"Obaidand, Z.K., Al Saffar, N.F.H.: Image encryption based on elliptic curve cryptosystem. International Journal of Electrical and Computer Engineering (IJECE) 11(2), 1293\u20131302 (2021)","journal-title":"International Journal of Electrical and Computer Engineering (IJECE)"},{"key":"5867_CR36","doi-asserted-by":"publisher","first-page":"150592","DOI":"10.1109\/ACCESS.2021.3126008","volume":"9","author":"H Kim","year":"2021","unstructured":"Kim, H., Jeon, Y., Kim, G., Kim, J., Sim, B.Y., Han, D.G., Hong, D.: A new method for designing lightweight S-boxes with high differential and linear branch numbers, and its application. IEEE Access. 9, 150592\u2013150607 (2021)","journal-title":"IEEE Access."},{"key":"5867_CR37","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian, Y., Wang, X.: Fractal sorting matrix and its application on chaotic image encryption. Information Sciences 547, 1154\u20131169 (2021)","journal-title":"Information Sciences"},{"key":"5867_CR38","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.aej.2025.03.109","volume":"125","author":"SS Jamal","year":"2025","unstructured":"Jamal, S.S., Ali, R., Jamil, M.K., Nooh, S.A., Alblehai, F.: Secure S-box construction with 1D chaotic maps and finite field theory for block cipher encryption. Alexandria Engineering Journal 125, 278\u2013296 (2025)","journal-title":"Alexandria Engineering Journal"},{"key":"5867_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108144","volume":"187","author":"NA Azam","year":"2021","unstructured":"Azam, N.A., Hayat, U., Ayub, M.: A substitution box generator, its analysis, and applications in image encryption. Signal Processing 187, 108144 (2021)","journal-title":"Signal Processing"},{"issue":"7","key":"5867_CR40","doi-asserted-by":"publisher","DOI":"10.3390\/sym16070872","volume":"16","author":"AAT Khudhair","year":"2024","unstructured":"Khudhair, A.A.T., Maolood, A.T., Gbashi, E.K.: Symmetry analysis in construction two dynamic lightweight s-boxes based on the 2d tinkerbell map and the 2d duffing map. Symmetry 16(7), 872 (2024)","journal-title":"Symmetry"},{"key":"5867_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.123869","volume":"547","author":"AA Abd EL-Latif","year":"2020","unstructured":"Abd EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Physica A: Statistical Mechanics and its Applications 547, 123869 (2020)","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"5867_CR42","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.matcom.2020.07.007","volume":"178","author":"DS Malik","year":"2020","unstructured":"Malik, D.S., Shah, T.: Color multiple image encryption scheme based on 3D-chaotic maps. Mathematics and Computers in Simulation 178, 646\u2013666 (2020)","journal-title":"Mathematics and Computers in Simulation"},{"issue":"09","key":"5867_CR43","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127419501153","volume":"29","author":"G Cheng","year":"2019","unstructured":"Cheng, G., Wang, C., Chen, H.: A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. International Journal of Bifurcation and Chaos 29(09), 1950115 (2019)","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"11","key":"5867_CR44","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.3390\/e21111075","volume":"21","author":"S Khan","year":"2019","unstructured":"Khan, S., Han, L., Mudassir, G., Guehguih, B., Ullah, H.: 3C3R, an image encryption algorithm based on BBI, 2D-CA, and SM-DNA. Entropy. 21(11), 1075 (2019)","journal-title":"Entropy"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05867-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05867-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05867-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:32:58Z","timestamp":1767713578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05867-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,6]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5867"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05867-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,6]]},"assertion":[{"value":"23 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent for publication"}}],"article-number":"92"}}