{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T02:30:34Z","timestamp":1749090634544,"version":"3.37.3"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T00:00:00Z","timestamp":1710201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T00:00:00Z","timestamp":1710201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11760-024-03109-0","type":"journal-article","created":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T01:14:44Z","timestamp":1710292484000},"page":"4731-4740","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A new S-box generator algorithm based on chaos and cellular automata"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4096-0458","authenticated-orcid":false,"given":"F\u0131rat","family":"Artu\u011fer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,12]]},"reference":[{"key":"3109_CR1","volume-title":"Handbook of applied cryptography","author":"PC Van Oorschot","year":"1996","unstructured":"Van Oorschot, P.C., Menezes, A.J., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, New York (1996)"},{"key":"3109_CR2","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/j.ins.2021.07.036","volume":"576","author":"F Artu\u011fer","year":"2021","unstructured":"Artu\u011fer, F., \u00d6zkaynak, F.: An effective method to improve nonlinearity value of substitution boxes based on random selection. Inf. Sci. 576, 577\u2013588 (2021)","journal-title":"Inf. Sci."},{"unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael. In: Proceeding of 1st Advanced Encryption Conference, CA, USA, pp. 1\u201345, (1998)","key":"3109_CR3"},{"issue":"4","key":"3109_CR4","doi-asserted-by":"crossref","first-page":"571","DOI":"10.3390\/sym12040571","volume":"12","author":"F Artu\u011fer","year":"2020","unstructured":"Artu\u011fer, F., \u00d6zkaynak, F.: A novel method for performance improvement of chaos-based substitution boxes. Symmetry 12(4), 571 (2020)","journal-title":"Symmetry"},{"doi-asserted-by":"crossref","unstructured":"Alzaidi, A.A., Ahmad, M., Ahmed, H.S., Solami, E.A.: Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map. Complexity, (2018)","key":"3109_CR5","DOI":"10.1155\/2018\/9389065"},{"unstructured":"Artu\u011fer, F., \u00d6zkaynak, F.: A new algorithm to generate AES-like substitution boxes based on sine cosine optimization algorithm. Multimed. Tools Appl. 1\u201316","key":"3109_CR6"},{"issue":"6\u20137","key":"3109_CR7","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1016\/j.physleta.2012.01.009","volume":"376","author":"Y Wang","year":"2012","unstructured":"Wang, Y., Wong, K.W., Li, C., Li, Y.: A novel method to design S-box based on chaotic map and genetic algorithm. Phys. Lett. A 376(6\u20137), 827\u2013833 (2012)","journal-title":"Phys. Lett. A"},{"key":"3109_CR8","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.ins.2020.03.025","volume":"523","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Zhang, Z., Zhang, L.Y., Feng, J., Gao, J., Lei, P.: A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Inf. Sci. 523, 152\u2013166 (2020)","journal-title":"Inf. Sci."},{"issue":"22","key":"3109_CR9","doi-asserted-by":"crossref","first-page":"20203","DOI":"10.1007\/s00521-022-07589-4","volume":"34","author":"F Artu\u011fer","year":"2022","unstructured":"Artu\u011fer, F., \u00d6zkaynak, F.: SBOX-CGA: substitution box generator based on chaos and genetic algorithm. Neural Comput. Appl. 34(22), 20203\u201320211 (2022)","journal-title":"Neural Comput. Appl."},{"key":"3109_CR10","doi-asserted-by":"crossref","first-page":"10898","DOI":"10.1109\/ACCESS.2022.3144458","volume":"10","author":"M Kang","year":"2022","unstructured":"Kang, M., Wang, M.: New genetic operators for developing S-boxes with low boomerang uniformity. IEEE Access 10, 10898\u201310906 (2022)","journal-title":"IEEE Access"},{"issue":"3","key":"3109_CR11","doi-asserted-by":"crossref","first-page":"1713","DOI":"10.1007\/s12652-021-03392-6","volume":"14","author":"PK Behera","year":"2023","unstructured":"Behera, P.K., Gangopadhyay, S.: Evolving bijective S-boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties. J. Ambient. Intell. Humaniz. Comput. 14(3), 1713\u20131730 (2023)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"doi-asserted-by":"crossref","unstructured":"Tian, Y., Lu, Z.: Chaotic S-box: intertwining logistic map and bacterial foraging optimization. In: Mathematical Problems in Engineering, (2017)","key":"3109_CR12","DOI":"10.1155\/2017\/6969312"},{"issue":"4","key":"3109_CR13","doi-asserted-by":"crossref","first-page":"1028","DOI":"10.1016\/j.chaos.2006.08.003","volume":"36","author":"G Chen","year":"2008","unstructured":"Chen, G.: A novel heuristic method for obtaining S-boxes. Chaos, Solitons Fractals 36(4), 1028\u20131036 (2008)","journal-title":"Chaos, Solitons Fractals"},{"issue":"5","key":"3109_CR14","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3390\/info14050259","volume":"14","author":"A Kuznetsov","year":"2023","unstructured":"Kuznetsov, A., Karpinski, M., Ziubina, R., Kandiy, S., Frontoni, E., Peliukh, O., Kozak, R.: Generation of nonlinear substitutions by simulated annealing algorithm. Information 14(5), 259 (2023)","journal-title":"Information"},{"key":"3109_CR15","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1016\/j.procs.2015.07.394","volume":"57","author":"M Ahmad","year":"2015","unstructured":"Ahmad, M., Bhatia, D., Hassan, Y.: A novel ant colony optimization based scheme for substitution box design. Proc. Comput. Sci. 57, 572\u2013580 (2015)","journal-title":"Proc. Comput. Sci."},{"issue":"7","key":"3109_CR16","doi-asserted-by":"crossref","first-page":"717","DOI":"10.3390\/e22070717","volume":"22","author":"M Ahmad","year":"2020","unstructured":"Ahmad, M., Al-Solami, E.: Evolving dynamic S-boxes using fractional-order hopfield neural network based scheme. Entropy 22(7), 717 (2020)","journal-title":"Entropy"},{"key":"3109_CR17","doi-asserted-by":"crossref","first-page":"115305","DOI":"10.1016\/j.eswa.2021.115305","volume":"182","author":"KZ Zamli","year":"2021","unstructured":"Zamli, K.Z.: Optimizing S-box generation based on the adaptive agent heroes and cowards algorithm. Exp. Syst. Appl. 182, 115305 (2021)","journal-title":"Exp. Syst. Appl."},{"key":"3109_CR18","doi-asserted-by":"crossref","first-page":"116132","DOI":"10.1109\/ACCESS.2020.3004449","volume":"8","author":"M Ahmad","year":"2020","unstructured":"Ahmad, M., Khaja, I.A., Baz, A., Alhakami, H., Alhakami, W.: Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications. IEEE Access 8, 116132\u2013116147 (2020)","journal-title":"IEEE Access"},{"key":"3109_CR19","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1016\/j.cjph.2021.03.029","volume":"72","author":"LS Khan","year":"2021","unstructured":"Khan, L.S., Hazzazi, M.M., Khan, M., Jamal, S.S.: A novel image encryption based on rossler map diffusion and particle swarm optimization generated highly non-linear substitution boxes. Chin. J. Phys. 72, 558\u2013574 (2021)","journal-title":"Chin. J. Phys."},{"issue":"10","key":"3109_CR20","doi-asserted-by":"crossref","first-page":"5111","DOI":"10.1007\/s00521-020-05304-9","volume":"33","author":"N Hematpour","year":"2021","unstructured":"Hematpour, N., Ahadpour, S.: Execution examination of chaotic S-box dependent on improved PSO algorithm. Neural Comput. Appl. 33(10), 5111\u20135133 (2021)","journal-title":"Neural Comput. Appl."},{"issue":"23","key":"3109_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00521-021-06260-8","volume":"33","author":"KZ Zamli","year":"2021","unstructured":"Zamli, K.Z., Kader, A., Din, F., Alhadawi, H.S.: Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization. Neural Comput. Appl. 33(23), 1\u201318 (2021)","journal-title":"Neural Comput. Appl."},{"issue":"5","key":"3109_CR22","doi-asserted-by":"crossref","first-page":"7333","DOI":"10.1007\/s11042-020-10048-8","volume":"80","author":"HS Alhadawi","year":"2021","unstructured":"Alhadawi, H.S., Majid, M.A., Lambi\u0107, D., Ahmad, M.: A novel method of S-box design based on discrete chaotic maps and cuckoo search algorithm. Multimed. Tools Appl. 80(5), 7333\u20137350 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"3109_CR23","volume":"55","author":"HS Alhadawi","year":"2020","unstructured":"Alhadawi, H.S., Lambi\u0107, D., Zolkipli, M.F., Ahmad, M.: Globalized firefly algorithm and chaos for designing substitution box. J. Inform. Secur. Appl. 55, 102671 (2020)","journal-title":"J. Inform. Secur. Appl."},{"issue":"11","key":"3109_CR24","doi-asserted-by":"crossref","first-page":"7201","DOI":"10.1007\/s00521-018-3557-3","volume":"31","author":"HA Ahmed","year":"2019","unstructured":"Ahmed, H.A., Zolkipli, M.F., Ahmad, M.: A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 31(11), 7201\u20137210 (2019)","journal-title":"Neural Comput. Appl."},{"issue":"2","key":"3109_CR25","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1007\/s11071-016-3295-y","volume":"88","author":"T Farah","year":"2017","unstructured":"Farah, T., Rhouma, R., Belghith, S.: A novel method for designing S-box based on chaotic map and teaching\u2013learning-based optimization. Nonlinear Dyn. 88(2), 1059\u20131074 (2017)","journal-title":"Nonlinear Dyn."},{"doi-asserted-by":"crossref","unstructured":"Kuznetsov, A., Romeo, L., Poluyanenko, N., Kandiy, S., Kuznetsova, K.: Optimizing hill climbing algorithm parameters for generation of cryptographically strong S-boxes (2022)","key":"3109_CR26","DOI":"10.21203\/rs.3.rs-1657863\/v1"},{"issue":"5","key":"3109_CR27","doi-asserted-by":"crossref","first-page":"6943","DOI":"10.1007\/s11042-022-13612-6","volume":"82","author":"H Khan","year":"2023","unstructured":"Khan, H., Hazzazi, M.M., Jamal, S.S., Hussain, I., Khan, M.: New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes. Multimed. Tools Appl. 82(5), 6943\u20136964 (2023)","journal-title":"Multimed. Tools Appl."},{"doi-asserted-by":"crossref","unstructured":"Artu\u011fer, F. (2023). A new S-box generator algorithm based on 3D chaotic maps and whale optimization algorithm. Wireless Person. Commun. 1\u201319","key":"3109_CR28","DOI":"10.1007\/s11277-023-10456-7"},{"issue":"4","key":"3109_CR29","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1016\/j.icte.2022.11.005","volume":"9","author":"KZ Zamli","year":"2023","unstructured":"Zamli, K.Z., Din, F., Alhadawi, H.S., Khalid, S., Alsolai, H., Nour, M.K., Assam, M.: Exploiting an elitist barnacles mating optimizer implementation for substitution box optimization. ICT Express 9(4), 619\u2013627 (2023)","journal-title":"ICT Express"},{"doi-asserted-by":"crossref","unstructured":"\u00d6rs, S.B., Preneel, B., Verbauwhede, I.: Side-channel analysis attacks on hardware implementations of cryptographic algorithms. In: Wireless Security and Cryptography-Specifications and Implementations, pp. 213\u2013247 (2007)","key":"3109_CR30","DOI":"10.1201\/9780849387692.ch7"},{"issue":"4","key":"3109_CR31","doi-asserted-by":"crossref","first-page":"3165","DOI":"10.1007\/s11277-020-07841-x","volume":"116","author":"A Razaq","year":"2021","unstructured":"Razaq, A., Ullah, A., Alolaiyan, H., Yousaf, A.: A novel group theoretic and graphical approach for designing cryptographically strong nonlinear components of block ciphers. Wireless Pers. Commun. 116(4), 3165\u20133190 (2021)","journal-title":"Wireless Pers. Commun."},{"issue":"4","key":"3109_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11277-022-09524-1","volume":"124","author":"B Arshad","year":"2022","unstructured":"Arshad, B., Siddiqui, N., Hussain, Z., Ehatisham-ul-Haq, M.: A novel scheme for designing secure substitution boxes (S-boxes) based on mobius group and finite field. Wireless Person. Commun. 124(4), 1\u201322 (2022)","journal-title":"Wireless Person. Commun."},{"issue":"11","key":"3109_CR33","doi-asserted-by":"crossref","first-page":"7045","DOI":"10.1007\/s00521-019-04207-8","volume":"32","author":"A Anees","year":"2020","unstructured":"Anees, A., Chen, Y.P.P.: Designing secure substitution boxes based on permutation of symmetric group. Neural Comput. Appl. 32(11), 7045\u20137056 (2020)","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"3109_CR34","doi-asserted-by":"crossref","first-page":"2057","DOI":"10.1007\/s11277-021-08981-4","volume":"122","author":"A Razaq","year":"2022","unstructured":"Razaq, A., Ahmad, M., Yousaf, A., Alawida, M., Ullah, A., Shuaib, U.: A group theoretic construction of large number of AES-like substitution-boxes. Wireless Pers. Commun. 122(3), 2057\u20132080 (2022)","journal-title":"Wireless Pers. Commun."},{"issue":"3","key":"3109_CR35","doi-asserted-by":"crossref","first-page":"4163","DOI":"10.1007\/s11042-021-11635-z","volume":"81","author":"A Razaq","year":"2022","unstructured":"Razaq, A., Akhter, S., Yousaf, A., Shuaib, U., Ahmad, M.: A group theoretic construction of highly nonlinear substitution box and its applications in image encryption. Multimed. Tools Appl. 81(3), 4163\u20134184 (2022)","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"3109_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjp\/s13360-020-00666-4","volume":"135","author":"I Hussain","year":"2020","unstructured":"Hussain, I.: True-chaotic substitution box based on Boolean functions. Eur. Phys. J. Plus 135(8), 1\u201317 (2020)","journal-title":"Eur. Phys. J. Plus"},{"doi-asserted-by":"crossref","unstructured":"Bakunina, E.V., Dykyi, O.V. Synthesis method for S-boxes satisfying the criterion of correlation immunity of Boolean and 4-functions. J. Discrete Math. Sci. Cryptogr. 1\u201313 (2022)","key":"3109_CR37","DOI":"10.1080\/09720529.2021.2018112"},{"doi-asserted-by":"crossref","unstructured":"Sokolov, A.V., Radush, V.V.: A method for synthesis of S-boxes with good avalanche characteristics of component Boolean and quaternary functions. J. Discrete Math. Sci. Cryptogr. 1\u201312 (2022)","key":"3109_CR38","DOI":"10.1080\/09720529.2021.1964727"},{"key":"3109_CR39","doi-asserted-by":"crossref","first-page":"35682","DOI":"10.1109\/ACCESS.2020.2973679","volume":"8","author":"MSM Malik","year":"2020","unstructured":"Malik, M.S.M., Ali, M.A., Khan, M.A., Ehatisham-Ul-Haq, M., Shah, S.N.M., Rehman, M., Ahmad, W.: Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices. IEEE Access 8, 35682\u201335695 (2020)","journal-title":"IEEE Access"},{"issue":"7","key":"3109_CR40","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1007\/s00521-014-1663-4","volume":"25","author":"M Khan","year":"2014","unstructured":"Khan, M., Shah, T.: A novel image encryption technique based on H\u00e9non chaotic map and S8 symmetric group. Neural Comput. Appl. 25(7), 1717\u20131722 (2014)","journal-title":"Neural Comput. Appl."},{"issue":"2","key":"3109_CR41","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/s40314-023-02208-x","volume":"42","author":"I Hussain","year":"2023","unstructured":"Hussain, I., Anees, A., Al-Maadeed, T.A.: A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group. Comput. Appl. Math. 42(2), 80 (2023)","journal-title":"Comput. Appl. Math."},{"key":"3109_CR42","first-page":"1","volume":"2020","author":"M Ahmad","year":"2020","unstructured":"Ahmad, M., Al-Solami, E.: Improved 2D discrete hyperchaos mapping with complex behaviour and algebraic structure for strong S-boxes generation. Complexity 2020, 1\u201316 (2020)","journal-title":"Complexity"},{"issue":"11","key":"3109_CR43","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0241890","volume":"15","author":"N Siddiqui","year":"2020","unstructured":"Siddiqui, N., Yousaf, F., Murtaza, F., Ehatisham-ul-Haq, M., Ashraf, M.U., Alghamdi, A.M., Alfakeeh, A.S.: A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. PLoS ONE 15(11), e0241890 (2020)","journal-title":"PLoS ONE"},{"issue":"1","key":"3109_CR44","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.eij.2021.08.002","volume":"23","author":"F Artu\u011fer","year":"2022","unstructured":"Artu\u011fer, F., \u00d6zkaynak, F.: A method for generation of substitution box based on random selection. Egypt. Inform. J. 23(1), 127\u2013135 (2022)","journal-title":"Egypt. Inform. J."},{"issue":"1","key":"3109_CR45","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s40998-019-00230-6","volume":"44","author":"F \u00d6zkaynak","year":"2020","unstructured":"\u00d6zkaynak, F.: An analysis and generation toolbox for chaotic substitution boxes: A case study based on chaotic labyrinth rene thomas system. Iran. J. Sci. Technol. Trans. Electr. Eng. 44(1), 89\u201398 (2020)","journal-title":"Iran. J. Sci. Technol. Trans. Electr. Eng."},{"issue":"1","key":"3109_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13319-016-0112-9","volume":"8","author":"G Liu","year":"2017","unstructured":"Liu, G.: Designing S-box based on 4D\u20134wing hyperchaotic system. 3D Research 8(1), 1\u20139 (2017)","journal-title":"3D Research"},{"issue":"1","key":"3109_CR47","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1007\/s11071-020-05503-y","volume":"100","author":"D Lambi\u0107","year":"2020","unstructured":"Lambi\u0107, D.: A new discrete-space chaotic map based on the multiplication of integer numbers and its application in S-box design. Nonlinear Dyn. 100(1), 699\u2013711 (2020)","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"3109_CR48","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/j.chaos.2004.04.023","volume":"23","author":"G Tang","year":"2005","unstructured":"Tang, G., Liao, X., Chen, Y.: A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons Fractals 23(2), 413\u2013419 (2005)","journal-title":"Chaos, Solitons Fractals"},{"issue":"2","key":"3109_CR49","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","volume":"87","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu, \u00dc., Zengin, A., Pehlivan, I., Ka\u00e7ar, S.: A novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang system. Nonlinear Dyn. 87(2), 1081\u20131094 (2017)","journal-title":"Nonlinear Dyn."},{"issue":"6","key":"3109_CR50","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1007\/s11760-013-0577-4","volume":"9","author":"M Khan","year":"2015","unstructured":"Khan, M., Shah, T.: An efficient construction of substitution box with fractional chaotic system. SIViP 9(6), 1335\u20131338 (2015)","journal-title":"SIViP"},{"issue":"4","key":"3109_CR51","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1007\/s11760-016-1007-1","volume":"11","author":"F \u00d6zkaynak","year":"2017","unstructured":"\u00d6zkaynak, F., \u00c7elik, V., \u00d6zer, A.B.: A new S-box construction method based on the fractional-order chaotic Chen system. SIViP 11(4), 659\u2013664 (2017)","journal-title":"SIViP"},{"key":"3109_CR52","doi-asserted-by":"crossref","DOI":"10.1016\/j.physa.2019.124072","volume":"550","author":"F \u00d6zkaynak","year":"2020","unstructured":"\u00d6zkaynak, F.: On the effect of chaotic system in performance characteristics of chaos based S-box designs. Physica A 550, 124072 (2020)","journal-title":"Physica A"},{"issue":"2","key":"3109_CR53","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/24751839.2018.1434723","volume":"2","author":"D Lambi\u0107","year":"2018","unstructured":"Lambi\u0107, D.: S-box design method based on improved one-dimensional discrete chaotic map. J. Inform. Telecommun. 2(2), 181\u2013191 (2018)","journal-title":"J. Inform. Telecommun."},{"issue":"5","key":"3109_CR54","doi-asserted-by":"crossref","first-page":"1901","DOI":"10.1016\/S0960-0779(04)00454-0","volume":"23","author":"G Tang","year":"2005","unstructured":"Tang, G., Liao, X.: A method for designing dynamical S-boxes based on discretized chaotic map. Chaos, Solitons Fractals 23(5), 1901\u20131909 (2005)","journal-title":"Chaos, Solitons Fractals"},{"issue":"3","key":"3109_CR55","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1007\/s11071-013-0904-x","volume":"73","author":"M Khan","year":"2013","unstructured":"Khan, M., Shah, T., Gondal, M.A.: An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dyn. 73(3), 1795\u20131801 (2013)","journal-title":"Nonlinear Dyn."},{"issue":"36","key":"3109_CR56","doi-asserted-by":"crossref","first-page":"3733","DOI":"10.1016\/j.physleta.2010.07.019","volume":"374","author":"F \u00d6zkaynak","year":"2010","unstructured":"\u00d6zkaynak, F., \u00d6zer, A.B.: A method for designing strong S-boxes based on chaotic Lorenz system. Phys. Lett. A 374(36), 3733\u20133738 (2010)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"3109_CR57","doi-asserted-by":"crossref","first-page":"2303","DOI":"10.1007\/s11071-012-0621-x","volume":"70","author":"M Khan","year":"2012","unstructured":"Khan, M., Shah, T., Mahmood, H., Gondal, M.A., Hussain, I.: A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn. 70(3), 2303\u20132311 (2012)","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"3109_CR58","first-page":"1","volume":"36","author":"F Artu\u011fer","year":"2023","unstructured":"Artu\u011fer, F.: A novel algorithm based on DNA coding for substitution box generation problem. Neural Comput. Appl. 36(3), 1\u201312 (2023)","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"3109_CR59","doi-asserted-by":"crossref","first-page":"2115","DOI":"10.1007\/s11071-018-4478-5","volume":"94","author":"T Ye","year":"2018","unstructured":"Ye, T., Zhimao, L.: Chaotic S-box: Six-dimensional fractional Lorenz-Duffing chaotic system and O-shaped path scrambling. Nonlinear Dyn. 94(3), 2115\u20132126 (2018)","journal-title":"Nonlinear Dyn."},{"key":"3109_CR60","doi-asserted-by":"crossref","first-page":"1438","DOI":"10.1016\/j.ijleo.2016.11.152","volume":"130","author":"A Belazi","year":"2017","unstructured":"Belazi, A., Abd El-Latif, A.A.: A simple yet efficient S-box method based on chaotic sine map. Optik 130, 1438\u20131444 (2017)","journal-title":"Optik"},{"issue":"11","key":"3109_CR61","doi-asserted-by":"crossref","first-page":"15793","DOI":"10.1007\/s11042-022-11928-x","volume":"81","author":"TK Alshekly","year":"2022","unstructured":"Alshekly, T.K., Albahrani, E.A., Lafta, S.H.: 4d chaotic system as random substitution-box. Multimed. Tools Appl. 81(11), 15793\u201315814 (2022)","journal-title":"Multimed. Tools Appl."},{"issue":"16","key":"3109_CR62","doi-asserted-by":"crossref","first-page":"23899","DOI":"10.1007\/s11042-022-12069-x","volume":"82","author":"H Liu","year":"2023","unstructured":"Liu, H., Liu, J., Ma, C.: Constructing dynamic strong S-box using 3D chaotic map and application to image encryption. Multimed. Tools Appl. 82(16), 23899\u201323914 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"3109_CR63","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.matcom.2022.12.025","volume":"207","author":"S Zhu","year":"2023","unstructured":"Zhu, S., Deng, X., Zhang, W., Zhu, C.: Secure image encryption scheme based on a new robust chaotic map and strong S-box. Math. Comput. Simul. 207, 322\u2013346 (2023)","journal-title":"Math. Comput. Simul."},{"issue":"10","key":"3109_CR64","doi-asserted-by":"crossref","first-page":"9571","DOI":"10.1007\/s11071-023-08312-1","volume":"111","author":"S Zhou","year":"2023","unstructured":"Zhou, S., Qiu, Y., Wang, X., Zhang, Y.: Novel image cryptosystem based on new 2D hyperchaotic map and dynamical chaotic S-box. Nonlinear Dyn. 111(10), 9571\u20139589 (2023)","journal-title":"Nonlinear Dyn."},{"doi-asserted-by":"crossref","unstructured":"Ramakrishnan, B., Nkandeu, Y.P.K., Tamba, V.K., Tchamda, A.R., Rajagopal, K.: Image encryption based on S-box generation constructed by using a chaotic autonomous snap system with only one equilibrium point. Multimed. Tools Appl. 1\u201324 (2023)","key":"3109_CR65","DOI":"10.1007\/s11042-023-16367-w"},{"key":"3109_CR66","doi-asserted-by":"crossref","first-page":"116167","DOI":"10.1109\/ACCESS.2022.3218062","volume":"10","author":"A Haque","year":"2022","unstructured":"Haque, A., Abdulhussein, T.A., Ahmad, M., Falah, M.W., Abd El-Latif, A.A.: A strong hybrid S-box scheme based on Chaos, 2D cellular automata and algebraic structure. IEEE Access 10, 116167\u2013116181 (2022)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Szaban, M., Seredynski, F.: Application of cellular automata to create S-box functions. In: 2008 IEEE International Symposium on Parallel and Distributed Processing, pp. 1\u20137, (2008)","key":"3109_CR67","DOI":"10.1109\/IPDPS.2008.4536378"},{"issue":"3","key":"3109_CR68","doi-asserted-by":"crossref","first-page":"2003","DOI":"10.1007\/s11071-018-4471-z","volume":"94","author":"JA Aboytes-Gonz\u00e1lez","year":"2018","unstructured":"Aboytes-Gonz\u00e1lez, J.A., Murgu\u00eda, J.S., Mej\u00eda-Carlos, M., Gonz\u00e1lez-Aguilar, H., Ram\u00edrez-Torres, M.T.: Design of a strong S-box based on a matrix approach. Nonlinear Dyn. 94(3), 2003\u20132012 (2018)","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"3109_CR69","doi-asserted-by":"crossref","first-page":"1116","DOI":"10.1007\/s00034-017-0592-8","volume":"37","author":"BR Gangadari","year":"2018","unstructured":"Gangadari, B.R., Ahamed, S.R.: Programmable cellular automata-based low-power architecture to S-box: An application to WBAN. Circ. Syst. Signal Process. 37(3), 1116\u20131133 (2018)","journal-title":"Circ. Syst. Signal Process."},{"issue":"1","key":"3109_CR70","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s12095-018-0311-8","volume":"11","author":"L Mariot","year":"2019","unstructured":"Mariot, L., Picek, S., Leporati, A., Jakobovic, D.: Cellular automata based S-boxes. Cryptogr. Commun. 11(1), 41\u201362 (2019)","journal-title":"Cryptogr. Commun."},{"issue":"3","key":"3109_CR71","doi-asserted-by":"crossref","first-page":"443","DOI":"10.3390\/sym14030443","volume":"14","author":"W Alexan","year":"2022","unstructured":"Alexan, W., ElBeltagy, M., Aboshousha, A.: Rgb image encryption through cellular automata, S-box and the lorenz system. Symmetry 14(3), 443 (2022)","journal-title":"Symmetry"},{"issue":"1\u20132","key":"3109_CR72","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0167-2789(84)90245-8","volume":"10","author":"S Wolfram","year":"1984","unstructured":"Wolfram, S.: Universality and complexity in cellular automata. Physica D 10(1\u20132), 1\u201335 (1984)","journal-title":"Physica D"},{"doi-asserted-by":"crossref","unstructured":"Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Conference on the theory and application of cryptographic techniques, pp. 523\u2013534, Springer, Berlin, (1985)","key":"3109_CR73","DOI":"10.1007\/3-540-39799-X_41"},{"issue":"1","key":"3109_CR74","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"3109_CR75","doi-asserted-by":"crossref","first-page":"6649","DOI":"10.1007\/s11042-019-08393-4","volume":"79","author":"A Javeed","year":"2020","unstructured":"Javeed, A., Shah, T., Attaullah.: Design of an S-box using Rabinovich-Fabrikant system of differential equations perceiving third order nonlinearity. Multimed. Tools Appl. 79, 6649\u20136660 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"3109_CR76","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/s11277-020-07052-4","volume":"112","author":"A Javeed","year":"2020","unstructured":"Javeed, A., Shah, T., Ullah, A.: Construction of non-linear component of block cipher by means of chaotic dynamical system and symmetric group. Wireless Pers. Commun. 112, 467\u2013480 (2020)","journal-title":"Wireless Pers. Commun."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03109-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03109-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03109-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T13:10:29Z","timestamp":1716469829000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03109-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,12]]},"references-count":76,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["3109"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03109-0","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2024,3,12]]},"assertion":[{"value":"15 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}