{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T12:42:19Z","timestamp":1759754539120,"version":"build-2065373602"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04425-z","type":"journal-article","created":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T12:07:04Z","timestamp":1759752424000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Robust Statistical Test for Evaluating the Avalanche Effect in Block Ciphers"],"prefix":"10.1007","volume":"6","author":[{"given":"Maki Mahdi","family":"Abdulhassan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5102-9538","authenticated-orcid":false,"given":"Jamal Kamil K.","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Nada Qasim","family":"Muhammed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,6]]},"reference":[{"key":"4425_CR1","doi-asserted-by":"crossref","unstructured":"Doria M. The Application of Blockchain Technology in Securing Electronic Health Records Blockchain for Healthcare Data Security. No, this paper has not appeared, or been accepted to appear, in a Paper Series, Journal, or Book. The paper is based on research for the application of blockchain technology to secure Electronic Health Records in the Healthcare Industry. Overall, the paper is for my FT, 324-1. 2025.","DOI":"10.2139\/ssrn.5181147"},{"issue":"5","key":"4425_CR2","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1007\/s11036-023-02158-y","volume":"29","author":"P Kumar","year":"2024","unstructured":"Kumar P, Rahman M, Namasudra S, Moparthi NR. Enhancing security of medical images using deep learning, chaotic map, and hash table. Mob Networks Appl. 2024;29(5):1489\u2013503.","journal-title":"Mob Networks Appl"},{"issue":"1","key":"4425_CR3","first-page":"75","volume":"71","author":"S Katkuri","year":"2025","unstructured":"Katkuri S. Securing the digital frontier: legal analysis of cybersecurity, data privacy and cyber forensics in India. Indian J Public Adm. 2025;71(1):75\u201391.","journal-title":"Indian J Public Adm"},{"key":"4425_CR4","doi-asserted-by":"crossref","unstructured":"Patel CD, Aggarwal M, Chaubey NK. Enhancing Cyber-Physical systems security through advanced defense mechanisms. Advancing cyber security through quantum cryptography. IGI Global; 2025. pp. 307\u201342.","DOI":"10.4018\/979-8-3693-5961-7.ch011"},{"key":"4425_CR5","doi-asserted-by":"crossref","unstructured":"Deshpande RS, Dhal PK, Punitha N, Hussein AA, Abbas JK, Rao DMK. Enhancing Real-Time communication with Brain-Computer interface technologies. Concepts and applications of Brain-Computer interfaces. IGI Global Scientific Publishing; 2025. pp. 165\u201380.","DOI":"10.4018\/979-8-3693-7427-6.ch009"},{"key":"4425_CR6","doi-asserted-by":"crossref","unstructured":"Subramanian SM, Madanan M, Shalini TG, Hussein AA, Abbas JK, Rao DMK. Developing usable electronic devices for Brain-Computer interfaces. Brain-Computer interfaces and applications in business. IGI Global Scientific Publishing; 2025. pp. 27\u201344.","DOI":"10.4018\/979-8-3373-5122-3.ch002"},{"issue":"1","key":"4425_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.matcom.2004.09.001","volume":"68","author":"JCH Castro","year":"2005","unstructured":"Castro JCH, Sierra JM, Seznec A, Izquierdo A, Ribagorda A. The strict avalanche criterion randomness test. Math Comput Simul. 2005;68(1):1\u20137.","journal-title":"Math Comput Simul"},{"key":"4425_CR8","doi-asserted-by":"publisher","first-page":"112472","DOI":"10.1109\/ACCESS.2022.3215778","volume":"10","author":"D Upadhyay","year":"2022","unstructured":"Upadhyay D, Gaikwad N, Zaman M, Sampalli S. Investigating the avalanche effect of various cryptographically secure hash functions and hash-based applications. IEEE Access. 2022;10:112472\u201386.","journal-title":"IEEE Access"},{"key":"4425_CR9","doi-asserted-by":"publisher","first-page":"2480","DOI":"10.1016\/j.procs.2023.01.223","volume":"218","author":"K Karisma","year":"2023","unstructured":"Karisma K, Tehrani PM. Data protection governance framework: A silver bullet for blockchain-enabled applications. Procedia Comput Sci. 2023;218:2480\u201393.","journal-title":"Procedia Comput Sci"},{"key":"4425_CR10","doi-asserted-by":"crossref","unstructured":"Hasan MR, Guest R, Deravi F. Presentation-Level privacy protection techniques for automated face Recognition-A survey. ACM Computing Surveys; 2023.","DOI":"10.1145\/3583135"},{"key":"4425_CR11","doi-asserted-by":"publisher","first-page":"108948","DOI":"10.1016\/j.ijepes.2023.108948","volume":"148","author":"J Chen","year":"2023","unstructured":"Chen J, Nanehkaran YA, Chen W, Liu Y, Zhang D. Data-driven intelligent method for detection of electricity theft. Int J Electr Power Energy Syst. 2023;148:108948.","journal-title":"Int J Electr Power Energy Syst"},{"key":"4425_CR12","first-page":"103407","volume":"72","author":"R Anushiadevi","year":"2023","unstructured":"Anushiadevi R, Amirtharajan R. Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram. J Inform Secur Appl. 2023;72:103407.","journal-title":"J Inform Secur Appl"},{"key":"4425_CR13","doi-asserted-by":"crossref","unstructured":"Acheme SO, Nwankwo W, Acheme D, Nwankwo CP. Advances in Intelligent Systems, Computer Science and Digital Economics IV. Cham: Springer Nature Switzerland; 2023. pp. 443\u201360. A Crypto-Stego Distributed Data Hiding Model for Data Protection in a Single Cloud Environment.","DOI":"10.1007\/978-3-031-24475-9_38"},{"issue":"1","key":"4425_CR14","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1007\/s13198-021-01324-3","volume":"14","author":"R Kaur","year":"2023","unstructured":"Kaur R, Ali A. RETRACTED ARTICLE: performance evaluation of secure blockchain framework for iot-based data communication. Int J Syst Assur Eng Manage. 2023;14(1):492\u2013492.","journal-title":"Int J Syst Assur Eng Manage"},{"key":"4425_CR15","doi-asserted-by":"publisher","first-page":"116863","DOI":"10.1016\/j.trac.2022.116863","volume":"158","author":"GMS Ross","year":"2023","unstructured":"Ross GMS, Zhao Y, Bosman AJ, Geballa-Koukoula A, Zhou H, Elliott CT, Salentijn GIJ. Best practices and current implementation of emerging smartphone-based (bio) sensors\u2013Part 1: data handling and ethics. Trac-Trends Anal Chem. 2023;158:116863.","journal-title":"Trac-Trends Anal Chem"},{"issue":"2","key":"4425_CR16","doi-asserted-by":"publisher","first-page":"201","DOI":"10.3390\/e25020201","volume":"25","author":"Z Liu","year":"2023","unstructured":"Liu Z, Miao D, Li R, Liu Y, Li X. Cache-Based privacy protection scheme for continuous location query. Entropy. 2023;25(2):201.","journal-title":"Entropy"},{"issue":"2","key":"4425_CR17","first-page":"1867","volume":"13","author":"Y Alemami","year":"2023","unstructured":"Alemami Y, Al-Ghonmein AM, Al-Moghrabi KG, Mohamed MA. Cloud data security and various cryptographic algorithms. Int J Electr Comput Eng. 2023;13(2):1867.","journal-title":"Int J Electr Comput Eng"},{"issue":"1","key":"4425_CR18","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s00500-022-06950-y","volume":"27","author":"MD Boomija","year":"2023","unstructured":"Boomija MD, Raja SK. Securing medical data by role-based user policy with partially homomorphic encryption in AWS cloud. Soft Comput. 2023;27(1):559\u201368.","journal-title":"Soft Comput"},{"issue":"2","key":"4425_CR19","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s40314-023-02208-x","volume":"42","author":"I Hussain","year":"2023","unstructured":"Hussain I, Anees A, Al-Maadeed TA. A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group. Comput Appl Math. 2023;42(2):80.","journal-title":"Comput Appl Math"},{"key":"4425_CR20","doi-asserted-by":"crossref","unstructured":"Zheng Z, Tian K, Liu F. Modern cryptography volume 2: A classical introduction to informational and mathematical principle. Springer Nature; 2023. p. 191.","DOI":"10.1007\/978-981-19-7644-5"},{"issue":"3","key":"4425_CR21","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.11591\/eei.v12i3.4039","volume":"12","author":"MK Hussein","year":"2023","unstructured":"Hussein MK, Amintoosi H. Protection of images by combination of Vernam stream cipher, AES and LSB steganography in a video clip. Bull Electr Eng Inf. 2023;12(3):1578\u201385.","journal-title":"Bull Electr Eng Inf"},{"issue":"3\u20134","key":"4425_CR22","first-page":"399","volume":"20","author":"V Tiwari","year":"2023","unstructured":"Tiwari V, Singh A, Tentu AN, Saxena A. Generation of 8\u00d7 8 S-boxes using 4\u00d74 optimal S-boxes. Int J Inf Comput Secur. 2023;20(3\u20134):399\u2013413.","journal-title":"Int J Inf Comput Secur"},{"key":"4425_CR23","doi-asserted-by":"crossref","unstructured":"Xu J, Hong N, Xu Z, Zhao Z, Wu C, Kuang K, Shum H. Data-Driven Learning for Data Rights, Data Pricing, and Privacy Computing. Engineering. 2023.","DOI":"10.1016\/j.eng.2022.12.008"},{"issue":"2","key":"4425_CR24","doi-asserted-by":"publisher","first-page":"225","DOI":"10.23919\/cje.2021.00.415","volume":"32","author":"M Kang","year":"2023","unstructured":"Kang M, Li Y, Jiao L, Wang M. Differential analysis of ARX block ciphers based on an improved genetic algorithm. Chin J Electron. 2023;32(2):225\u201336.","journal-title":"Chin J Electron"},{"key":"4425_CR25","doi-asserted-by":"crossref","unstructured":"Reed IS, Chen X, Reed IS, Chen X. Linear block codes. Error-Control Coding for Data Networks; 1999. pp. 73\u2013137.","DOI":"10.1007\/978-1-4615-5005-1_3"},{"key":"4425_CR26","doi-asserted-by":"publisher","first-page":"102999","DOI":"10.1016\/j.adhoc.2022.102999","volume":"138","author":"H Noura","year":"2023","unstructured":"Noura H, Salman O, Couturier R, Chehab A. LESCA: lightweight stream cipher algorithm for emerging systems. Ad Hoc Netw. 2023;138:102999.","journal-title":"Ad Hoc Netw"},{"issue":"10","key":"4425_CR27","doi-asserted-by":"publisher","first-page":"8459","DOI":"10.1016\/j.jksuci.2021.08.026","volume":"34","author":"F Ikbal","year":"2022","unstructured":"Ikbal F, Gopikakumari R. Image block generation from block-based SMRT in colour image encryption and its performance analysis. J King Saud University-Computer Inform Sci. 2022;34(10):8459\u201377.","journal-title":"J King Saud University-Computer Inform Sci"},{"issue":"5","key":"4425_CR28","first-page":"294","volume":"1","author":"A Misra","year":"2011","unstructured":"Misra A, Gupta A, Rai D. Analysing the parameters of chaos-based image encryption schemes. World Appl Program. 2011;1(5):294\u20139.","journal-title":"World Appl Program"},{"key":"4425_CR29","doi-asserted-by":"crossref","unstructured":"Mohammed NQ, Amir A, Salih MH, Ahmad RB, Matem R, Thalji N, Al-Shakhli TR. Design Hybrid Architecture to Implement AES Algorithm on FPGA for IoT Applications. Baghdad Science Journal. 2024.","DOI":"10.21123\/bsj.2024.8931"},{"key":"4425_CR30","doi-asserted-by":"publisher","first-page":"170316","DOI":"10.1016\/j.ijleo.2022.170316","volume":"272","author":"S Benaissi","year":"2023","unstructured":"Benaissi S, Chikouche N, Hamza R. A novel image encryption algorithm based on hybrid chaotic maps using a key image. Optik. 2023;272:170316.","journal-title":"Optik"},{"key":"4425_CR31","first-page":"103444","volume":"73","author":"VA Thakor","year":"2023","unstructured":"Thakor VA, Razzaque MA, Darji AD, Patel AR. A novel 5-bit S-box design for lightweight cryptography algorithms. J Inform Secur Appl. 2023;73:103444.","journal-title":"J Inform Secur Appl"},{"issue":"1","key":"4425_CR32","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.jksuci.2022.11.012","volume":"35","author":"MAM Khan","year":"2023","unstructured":"Khan MAM, Azam NA, Hayat U, Kamarulhaili H. A novel deterministic substitution box generator over elliptic curves for real-time applications. J King Saud University-Computer Inform Sci. 2023;35(1):219\u201336.","journal-title":"J King Saud University-Computer Inform Sci"},{"key":"4425_CR33","doi-asserted-by":"crossref","unstructured":"Liu G, Lu H, Wang W, Liu Z, Huang H. A cross-domain authentication scheme for vehicular networks based on mobile edge computing. IEEE Internet Things J. 2025.","DOI":"10.1109\/JIOT.2025.3540162"},{"key":"4425_CR34","doi-asserted-by":"crossref","unstructured":"Biham E, Shamir A, Biham E, Shamir A. Differential cryptanalysis of DES variants. Differ Cryptanalysis Data Encryption Standard, 33\u201377. 1993.","DOI":"10.1007\/978-1-4613-9314-6_4"},{"issue":"3","key":"4425_CR35","doi-asserted-by":"publisher","first-page":"2769","DOI":"10.1007\/s11071-024-10317-3","volume":"113","author":"Z Li","year":"2025","unstructured":"Li Z, Yang S, Tan W, Wu X. A remote sensing image encryption and compression scheme using novel hyperchaotic system and plaintext related random S-box. Nonlinear Dyn. 2025;113(3):2769\u201390.","journal-title":"Nonlinear Dyn"},{"key":"4425_CR36","doi-asserted-by":"crossref","unstructured":"Chandra P, Malladi R. PSR: an improvement of lightweight cryptography algorithm for data security in cloud computing. Int J Adv Comput Sci Appl. 2025;16(1).","DOI":"10.14569\/IJACSA.2025.01601101"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04425-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04425-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04425-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T12:07:11Z","timestamp":1759752431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04425-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":36,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["4425"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04425-z","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,6]]},"assertion":[{"value":"5 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"875"}}