{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T02:27:43Z","timestamp":1772764063195,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T00:00:00Z","timestamp":1574380800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T00:00:00Z","timestamp":1574380800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11277-019-06973-z","type":"journal-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:02:51Z","timestamp":1574445771000},"page":"2091-2105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Novel Technique to Improve Nonlinearity of Substitution Box Without Disturbing Its Mathematical Properties"],"prefix":"10.1007","volume":"111","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1898-4082","authenticated-orcid":false,"given":"Abdul","family":"Razaq","sequence":"first","affiliation":[]},{"given":"Atta","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Adil","family":"Waheed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,22]]},"reference":[{"key":"6973_CR1","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal,28, 656\u2013715.","journal-title":"Bell Systems Technical Journal"},{"issue":"16","key":"6973_CR2","doi-asserted-by":"publisher","first-page":"e3312","DOI":"10.1002\/dac.3312","volume":"30","author":"I Memon","year":"2017","unstructured":"Memon, I., Arain, Q. A., Memon, M. H., Mangi, F. A., & Akhtar, R. (2017). Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems,30(16), e3312.","journal-title":"International Journal of Communication Systems"},{"key":"6973_CR3","volume-title":"Differential cryptanalysis of the data encryption standard","author":"E Biham","year":"2012","unstructured":"Biham, E., & Shamir, A. (2012). Differential cryptanalysis of the data encryption standard. Berlin: Springer."},{"key":"6973_CR4","volume-title":"Introduction to modern cryptography","author":"Y Lindell","year":"2014","unstructured":"Lindell, Y., & Katz, J. (2014). Introduction to modern cryptography. London: Chapman and Hall\/CRC."},{"issue":"2","key":"6973_CR5","first-page":"2347","volume":"2","author":"V Agrawal","year":"2014","unstructured":"Agrawal, V., Agrawal, S., & Deshmukh, R. (2014). Analysis and review of encryption and decryption for secure communication. International Journal of Scientific Engineering and Research,2(2), 2347\u20133878.","journal-title":"International Journal of Scientific Engineering and Research"},{"issue":"6","key":"6973_CR6","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1049\/ip-e.1988.0044","volume":"135","author":"J Pieprzyk","year":"1988","unstructured":"Pieprzyk, J., & Finkelstein, G. (1988). Towards effective nonlinear cryptosystem design. IEE Proceedings E-Computers and Digital Techniques,135(6), 325\u2013335.","journal-title":"IEE Proceedings E-Computers and Digital Techniques"},{"issue":"2","key":"6973_CR7","first-page":"137","volume":"9","author":"I Vergili","year":"2001","unstructured":"Vergili, I., & Y\u00fccel, M. D. (2001). Avalanche and bit independence properties for the ensembles of randomly chosen n\\times n S-boxes. Turkish Journal of Electrical Engineering & Computer Sciences,9(2), 137\u2013146.","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"key":"6973_CR8","unstructured":"Webster, A., Tavares, S. (1986). On the design of S-boxes. In Advances in cryptology: Proceedings of Crypto\u201985 lecture notes in computer science (pp. 523\u2013534)."},{"key":"6973_CR9","doi-asserted-by":"crossref","unstructured":"Matsui, M. (1994). Linear cryptanalysis method of DES cipher. In Advances in cryptology, proceeding of the Eurocrypt\u201993. Lecture notes computer science (Vol. 765, pp. 386\u2013397).","DOI":"10.1007\/3-540-48285-7_33"},{"key":"6973_CR10","doi-asserted-by":"publisher","first-page":"282","DOI":"10.5560\/zna.2012-0022","volume":"67a","author":"I Hussain","year":"2012","unstructured":"Hussain, I., Shah, T., Gondal, M. A., & Mahmood, H. (2012). Generalized majority logic criterion to analyze the statistical strength of S-boxes. Zeitschrift f\u00fcr Naturforschung A,67a, 282\u2013288.","journal-title":"Zeitschrift f\u00fcr Naturforschung A"},{"issue":"3","key":"6973_CR11","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1007\/s11277-015-2295-4","volume":"82","author":"A Anees","year":"2015","unstructured":"Anees, A., & Ahmed, Z. (2015). A technique for designing substitution box based on van der pol oscillator. Wireless Personal Communications,82(3), 1497\u20131503.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"6973_CR12","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s00354-016-0302-2","volume":"34","author":"H Isa","year":"2016","unstructured":"Isa, H., Jamil, N., & Z\u2019aba, M. R. (2016). Construction of cryptographically strong S-boxes inspired by bee waggle dance. New Generation Computing,34(3), 221\u2013238.","journal-title":"New Generation Computing"},{"issue":"6\u20137","key":"6973_CR13","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.physleta.2012.01.009","volume":"376","author":"Y Wang","year":"2012","unstructured":"Wang, Y., Wong, K. W., Li, C., & Li, Y. (2012). A novel method to design S-box based on chaotic map and genetic algorithm. Physics Letters A,376(6\u20137), 827\u2013833.","journal-title":"Physics Letters A"},{"issue":"2","key":"6973_CR14","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s11071-016-3295-y","volume":"88","author":"T Farah","year":"2017","unstructured":"Farah, T., Rhouma, R., & Belghith, S. (2017). A novel method for designing S-box based on chaotic map and teaching\u2013learning-based optimization. Nonlinear Dynamics,88(2), 1059\u20131074.","journal-title":"Nonlinear Dynamics"},{"key":"6973_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/5101934","volume":"2017","author":"A Razaq","year":"2017","unstructured":"Razaq, A., Yousaf, A., Shuaib, U., Siddiqui, N., Ullah, A., & Waheed, A. (2017). A novel construction of substitution box involving coset diagram and a bijective map. Security and Communication Networks, 2017, 1\u201316.","journal-title":"Security and Communication Networks"},{"key":"6973_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCYB.2018.2882924","volume":"99","author":"T Zhang","year":"2018","unstructured":"Zhang, T., Chen, C. P., Chen, L., Xu, X., & Hu, B. (2018). Design of highly nonlinear substitution boxes based on I-Ching operators. IEEE Transactions on Cybernetics,99, 1\u201310.","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"1","key":"6973_CR17","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/e20010012","volume":"20","author":"Q Lai","year":"2017","unstructured":"Lai, Q., Akgul, A., Li, C., Xu, G., & \u00c7avu\u015fo\u011flu, \u00dc. (2017). A new chaotic system with multiple attractors: Dynamic analysis, circuit realization and S-box design. Entropy,20(1), 12.","journal-title":"Entropy"},{"key":"6973_CR18","doi-asserted-by":"publisher","first-page":"525","DOI":"10.3390\/e20070525","volume":"20","author":"E Al Solami","year":"2018","unstructured":"Al Solami, E., Ahmad, M., Volos, C., Doja, M., & Beg, M. (2018). A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy,20, 525.","journal-title":"Entropy"},{"issue":"11","key":"6973_CR19","doi-asserted-by":"publisher","first-page":"7201","DOI":"10.1007\/s00521-018-3557-3","volume":"31","author":"HA Ahmed","year":"2019","unstructured":"Ahmed, H. A., Zolkipli, M. F., & Ahmad, M. (2019). A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Computing and Applications, 31(11), 7201\u20137210.","journal-title":"Neural Computing and Applications"},{"issue":"11","key":"6973_CR20","doi-asserted-by":"publisher","first-page":"3871","DOI":"10.1007\/s10773-019-04254-w","volume":"58","author":"F Firdousi","year":"2019","unstructured":"Firdousi, F., Batool, S. I., & Amin, M. (2019). A novel construction scheme for nonlinear component based on quantum map. International Journal of Theoretical Physics, 58(11), 3871\u20133898.","journal-title":"International Journal of Theoretical Physics"},{"issue":"3","key":"6973_CR21","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3390\/e21030245","volume":"21","author":"AH Zahid","year":"2019","unstructured":"Zahid, A. H., Arshad, M. J., & Ahmad, M. (2019). A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy,21(3), 245.","journal-title":"Entropy"},{"key":"6973_CR22","doi-asserted-by":"publisher","first-page":"38826","DOI":"10.1109\/ACCESS.2019.2906222","volume":"7","author":"L Shuai","year":"2019","unstructured":"Shuai, L., Wang, L., Miao, L., & Zhou, X. (2019). S-boxes construction based on the Cayley graph of the symmetric group for UASNs. IEEE Access,7, 38826\u201338832.","journal-title":"IEEE Access"},{"issue":"22","key":"6973_CR23","doi-asserted-by":"publisher","first-page":"32467","DOI":"10.1007\/s11042-019-07957-8","volume":"78","author":"A Ullah","year":"2019","unstructured":"Ullah, A., Javeed, A., & Shah, T. (2019). A scheme based on algebraic and chaotic structures for the construction of substitution box. Multimedia Tools and Applications, 78(22), 32467\u201332484.","journal-title":"Multimedia Tools and Applications"},{"issue":"10","key":"6973_CR24","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.3390\/e21101004","volume":"21","author":"Q Lu","year":"2019","unstructured":"Lu, Q., Zhu, C., & Wang, G. (2019). A novel S-box design algorithm based on a new compound chaotic system. Entropy,21(10), 1004.","journal-title":"Entropy"},{"key":"6973_CR25","unstructured":"Liu, L., & Lei, Z. (2019). An approach for constructing the S-box using the CML system. In Journal of physics: Conference series (Vol. 1303, No. 1, p. 012090). IOP Publishing."},{"issue":"1","key":"6973_CR26","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s11277-017-5054-x","volume":"99","author":"U Atta","year":"2018","unstructured":"Atta, U., Jamal, S. S., & Shah, T. (2018). A novel algebraic technique for the construction of strong substitution box. Wireless Personal Communications,99(1), 213\u2013226.","journal-title":"Wireless Personal Communications"},{"key":"6973_CR27","doi-asserted-by":"crossref","unstructured":"Akhtar, T., Din, N., & Uddin, J. (2019). Substitution box design based on chaotic maps and cuckoo search algorithm. In 2019 International conference on advanced communication technologies and networking (CommNet) (pp. 1\u20137). IEEE.","DOI":"10.1109\/COMMNET.2019.8742391"},{"key":"6973_CR28","volume-title":"Group theory and its application to physical problems","author":"M Hamermesh","year":"2012","unstructured":"Hamermesh, M. (2012). Group theory and its application to physical problems. North Chelmsford: Courier Corporation."},{"key":"6973_CR29","unstructured":"Skipjack and Kea: Algorithm specifications version 2 (pp. 1\u201323) (1998). http:\/\/csrc.nist.gov\/CryptoToolkit\/."},{"issue":"3","key":"6973_CR30","first-page":"14","volume":"2","author":"XY Shi","year":"2002","unstructured":"Shi, X. Y., Xiao, Hu, You, X. C., & Lam, K. Y. (2002). A method for obtaining cryptographically strong 8*8 S-boxes. International Conference on Advanced Information Networking and Applications,2(3), 14\u201320.","journal-title":"International Conference on Advanced Information Networking and Applications"},{"key":"6973_CR31","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.chaos.2004.04.023","volume":"23","author":"T Guoping","year":"2005","unstructured":"Guoping, T., Xiaofeng, L., & Yong, C. (2005). A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons & Fractals,23, 413.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"2","key":"6973_CR32","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G Jakimoski","year":"2001","unstructured":"Jakimoski, G., & Kocarev, L. (2001). Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications,48(2), 163\u2013169.","journal-title":"IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications"},{"issue":"4","key":"6973_CR33","first-page":"304","volume":"8","author":"ES Abuelyman","year":"2008","unstructured":"Abuelyman, E. S., & Alsehibani, A. A. S. (2008). An optimized implementation of the S-box using residue of prime numbers. International Journal of Computer Science and Network Security,8(4), 304\u2013309.","journal-title":"International Journal of Computer Science and Network Security"},{"issue":"6","key":"6973_CR34","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s00521-012-0870-0","volume":"22","author":"I Hussain","year":"2013","unstructured":"Hussain, I., Shah, T., Gondal, M. A., Khan, W. A., & Mahmood, H. (2013). A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Computing and Applications,22(6), 1085\u20131093.","journal-title":"Neural Computing and Applications"},{"key":"6973_CR35","unstructured":"Meier, W., & Staffelbach, O. (1989). Nonlinearity criteria for cryptographic functions. In Workshop on the theory and application of cryptographic techniques (pp. 549\u2013562). Berlin: Springer."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06973-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06973-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06973-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,21]],"date-time":"2020-11-21T01:19:23Z","timestamp":1605921563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06973-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,22]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["6973"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06973-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,22]]},"assertion":[{"value":"22 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}