{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:17:11Z","timestamp":1765228631727,"version":"3.46.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T00:00:00Z","timestamp":1758326400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T00:00:00Z","timestamp":1758326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Nat Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s11047-025-10052-7","type":"journal-article","created":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T12:45:04Z","timestamp":1758372304000},"page":"813-828","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of cryptographically suitable lightweight cellular automata based substitution-boxes using reinforcement learning"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8188-2656","authenticated-orcid":false,"given":"Ebey S","family":"Raj","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1413-6932","authenticated-orcid":false,"given":"A.","family":"Aravind","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8939-6985","authenticated-orcid":false,"given":"Anita","family":"John","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7074-090X","authenticated-orcid":false,"given":"Jimmy","family":"Jose","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,20]]},"reference":[{"key":"10052_CR1","first-page":"2214","volume":"9","author":"E Afify","year":"2020","unstructured":"Afify E, Alez RA, Khalil A, Alsobky W (2020) Performance analysis of advanced encryption standard (aes) s-boxes. International Journal of Recent Technology and Engineering 9:2214\u20132218","journal-title":"International Journal of Recent Technology and Engineering"},{"key":"10052_CR2","doi-asserted-by":"publisher","unstructured":"Aravind A, John A, Jose J (2024) Exploring diverse configurations of cellular automata based s-boxes using reinforcement learning. Cellular Automata - 16th International Conference on Cellular Automata for Research and Industry, ACRI 2024, Florence, Italy, September 9-11, 2024, Proceedings 14978, 109\u2013120 . https:\/\/doi.org\/10.1007\/978-3-031-71552-5_10","DOI":"10.1007\/978-3-031-71552-5_10"},{"key":"10052_CR3","doi-asserted-by":"publisher","unstructured":"Ayyagari T, Saji A, John A, Jose J (2022) Exploring lightweight s-boxes using cellular automata and reinforcement learning. Cellular Automata - 15th International Conference on Cellular Automata for Research and Industry, ACRI 2022, Geneva, Switzerland, September 12-15, 2022, Proceedings 13402, 17\u201328 . https:\/\/doi.org\/10.1007\/978-3-031-14926-9_2","DOI":"10.1007\/978-3-031-14926-9_2"},{"key":"10052_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4_1","volume-title":"The advanced encryption standard process, 1\u20138","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The advanced encryption standard process, 1\u20138. Springer, Berlin Heidelberg, Berlin, Heidelberg"},{"key":"10052_CR5","volume-title":"Deep Learn","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep Learn. MIT Press, Cambridge"},{"key":"10052_CR6","doi-asserted-by":"publisher","first-page":"1675","DOI":"10.1080\/09720529.2016.1160533","volume":"20","author":"J Jose","year":"2017","unstructured":"Jose J, RoyChowdhury D (2017) Investigating four neighbourhood cellular automata as better cryptographic primitives. J Discret Math Sci Cryptogr 20:1675\u20131695. https:\/\/doi.org\/10.1080\/09720529.2016.1160533","journal-title":"J Discret Math Sci Cryptogr"},{"key":"10052_CR7","doi-asserted-by":"publisher","unstructured":"Mariot L, Manzoni L (2022) On the linear components space of s-boxes generated by orthogonal cellular automata. Cellular Automata - 15th International Conference on Cellular Automata for Research and Industry, ACRI 2022, Geneva, Switzerland, September 12-15, 2022, Proceedings 13402, 52\u201362 . https:\/\/doi.org\/10.1007\/978-3-031-14926-9_5","DOI":"10.1007\/978-3-031-14926-9_5"},{"key":"10052_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s11047-023-09956-z","volume":"23","author":"L Mariot","year":"2024","unstructured":"Mariot L, Manzoni L (2024) A classification of s-boxes generated by orthogonal cellular automata. Nat Comput 23:5\u201316","journal-title":"Nat Comput"},{"key":"10052_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s12095-018-0311-8","volume":"11","author":"L Mariot","year":"2019","unstructured":"Mariot L, Picek S, Leporati A, Jakobovic D (2019) Cellular automata based s-boxes. Cryptogr Commun 11:41\u201362","journal-title":"Cryptogr Commun"},{"key":"10052_CR10","doi-asserted-by":"publisher","unstructured":"Mariot L, Saletta M, Leporati A, Manzoni L (2020) Exploring semi-bent boolean functions arising from cellular automata. Cellular Automata - 14th International Conference on Cellular Automata for Research and Industry, ACRI 2020, Lodz, Poland, December 2-4, 2020, Proceedings 12599, 56\u201366 . https:\/\/doi.org\/10.1007\/978-3-030-69480-7_7","DOI":"10.1007\/978-3-030-69480-7_7"},{"key":"10052_CR11","doi-asserted-by":"crossref","unstructured":"Meier W, Staffelbach O (1991) Analysis of pseudo random sequences generated by cellular automata. Advances in Cryptology - EUROCRYPT \u201991 186\u2013199","DOI":"10.1007\/3-540-46416-6_17"},{"key":"10052_CR12","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1080\/03772063.1990.11436890","volume":"36","author":"S Misra","year":"1990","unstructured":"Misra S, Das AK, RoyChowdhury D, Chaudhuri PP (1990) Cellular automata-theory and applications. IETE J Res 36:251\u2013259","journal-title":"IETE J Res"},{"key":"10052_CR13","doi-asserted-by":"crossref","unstructured":"Picek S, Mariot L, Leporati A., Jakobovic D (2017) Evolving s-boxes based on cellular automata with genetic programming (2017). In: Proceedings of GECCO \u201917: Genetic and Evolutionary Computation Conference Companion, July 15 - 19","DOI":"10.1145\/3067695.3076084"},{"key":"10052_CR14","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/BF03037658","volume":"23","author":"M Seredynski","year":"2005","unstructured":"Seredynski M, Bouvry P (2005) Block cipher based on reversible cellular automata. N Gener Comput 23:245\u2013258","journal-title":"N Gener Comput"},{"key":"10052_CR15","unstructured":"Stallings W (2019) Cryptography and Network Security Principles and Practice, Global Edition (Pearson Deutschland)"},{"key":"10052_CR16","doi-asserted-by":"crossref","unstructured":"Stinson DR, Paterson MB (2018) Cryptography: Theory and Practice 4 edn (CRC Press)","DOI":"10.1201\/9781315282497"},{"key":"10052_CR17","doi-asserted-by":"publisher","unstructured":"Szaban M, Seredynski F (2009) Cellular automata-based s-boxes vs. des s-boxes. Parallel Computing Technologies, 10th International Conference, PaCT 2009, Novosibirsk, Russia, August 31-September 4, 2009. Proceedings 5698, 269\u2013283. https:\/\/doi.org\/10.1007\/978-3-642-03275-2_27","DOI":"10.1007\/978-3-642-03275-2_27"},{"key":"10052_CR18","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1103\/revmodphys.55.601","volume":"55","author":"S Wolfram","year":"1983","unstructured":"Wolfram S (1983) Statistical mechanics of cellular automata. Rev Mod Phys 55:601\u2013644. https:\/\/doi.org\/10.1103\/revmodphys.55.601","journal-title":"Rev Mod Phys"},{"key":"10052_CR19","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/0196-8858(86)90028-X","volume":"7","author":"S Wolfram","year":"1986","unstructured":"Wolfram S (1986) Random sequence generation by cellular automata. Adv Appl Math 7:123\u2013169","journal-title":"Adv Appl Math"}],"container-title":["Natural Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11047-025-10052-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11047-025-10052-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11047-025-10052-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T18:44:01Z","timestamp":1765219441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11047-025-10052-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,20]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["10052"],"URL":"https:\/\/doi.org\/10.1007\/s11047-025-10052-7","relation":{},"ISSN":["1567-7818","1572-9796"],"issn-type":[{"type":"print","value":"1567-7818"},{"type":"electronic","value":"1572-9796"}],"subject":[],"published":{"date-parts":[[2025,9,20]]},"assertion":[{"value":"15 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}