{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T14:47:16Z","timestamp":1771339636789,"version":"3.50.1"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2871557","type":"journal-article","created":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T18:31:39Z","timestamp":1538505099000},"page":"55405-55418","source":"Crossref","is-referenced-by-count":99,"title":["A New 1D Chaotic Map and &lt;inline-formula&gt; \n                     &lt;tex-math notation=\"LaTeX\"&gt;$\\beta$ &lt;\/tex-math&gt;\n                  &lt;\/inline-formula&gt;-Hill Climbing for Generating Substitution-Boxes"],"prefix":"10.1109","volume":"6","author":[{"given":"Amer Awad","family":"Alzaidi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4915-9325","authenticated-orcid":false,"given":"Musheer","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"M. N.","family":"Doja","sequence":"additional","affiliation":[]},{"given":"Eesa Al","family":"Solami","sequence":"additional","affiliation":[]},{"given":"M. M. Sufyan","family":"Beg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/e20070525"},{"key":"ref38","author":"ibnkahla","year":"2005","journal-title":"Signal Processing for Mobile Communications Handbook"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3409-1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3199-x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2013.11.001"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","article-title":"A novel approach for strong S-box generation algorithm design based on chaotic scaled Zhongtang system","volume":"87","author":"\u00e7avu??lu","year":"2017","journal-title":"Nonlinear Dyn"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1038\/261459a0","article-title":"Simple mathematical models with very complicated dynamics","volume":"261","author":"may","year":"1976","journal-title":"Nature"},{"key":"ref36","first-page":"1","article-title":"Chaotic S-box: Six-dimensional fractional Lorenz-Duffing chaotic system and O-shaped path scrambling","author":"ye","year":"2018","journal-title":"Nonlinear Dyn"},{"key":"ref35","first-page":"1","article-title":"Construction of robust substitution boxes based on chaotic systems","author":"\u00f6zkaynak","year":"2018","journal-title":"Neural Comput Appl"},{"key":"ref34","first-page":"213","article-title":"A novel algebraic technique for the construction of strong substitution box","volume":"99","author":"ullah","year":"2017","journal-title":"Wireless Pers Commun"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","article-title":"Truncated and higher order differentials","author":"knudsen","year":"1995","journal-title":"Fast Software Encryption"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2018.03.019"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/978-3-642-31284-7_19","article-title":"PICARO&#x2014;A block cipher allowing efficient higher-order side-channel resistance","author":"piret","year":"2012","journal-title":"Applied Cryptography and Network Security"},{"key":"ref63","author":"daemen","year":"2002","journal-title":"The Design of Rijndael AES&#x2014;The Advanced Encryption Standard"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2283-y"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.205"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2846186"},{"key":"ref65","first-page":"751","article-title":"A new S-box structure named affine-power-affine","volume":"3","author":"cui","year":"2007","journal-title":"Int J Innov Comput Inf Control"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2511-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-17342-4","author":"knudsen","year":"2011","journal-title":"The Block Cipher Companion"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2014.7073265"},{"key":"ref22","first-page":"232","article-title":"S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm","volume":"27","author":"tian","year":"2016","journal-title":"Journal of Systems Engineering and Electronics"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1016\/j.procs.2015.07.394","article-title":"A novel ant colony optimization based scheme for substitution box design","volume":"57","author":"ahmad","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2016.06.001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6969312"},{"key":"ref26","first-page":"1","article-title":"A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map","author":"ahmed","year":"2018","journal-title":"Neural Comput Appl"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3295-y"},{"key":"ref50","author":"cusick","year":"2009","journal-title":"Cryptographic Boolean functions and Applications"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_41"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/11799313_23"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2285522"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_29"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/978-3-642-80350-5_30","article-title":"GAC&#x2014;The criterion for global avalanche characteristics of cryptographic functions","author":"zhang","year":"1996","journal-title":"J Univ Comput Sci"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.02.030"},{"key":"ref54","article-title":"Heuristic optimization of Boolean functions and substitution boxes for cryptography","author":"burnett","year":"2005"},{"key":"ref53","article-title":"Large substitution boxes with efficient combinational implementations","author":"wood","year":"2013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/BF00203967"},{"key":"ref10","author":"strogatz","year":"1994","journal-title":"Nonlinear Dynamics and Chaos With Applications to Physics Biology Chemistry and Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/7384.963463"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.02.022"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20542-2","volume":"354","author":"kocarev","year":"2011","journal-title":"Chaos-Based Cryptography"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2016.04.007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2017.2736515"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2017.04.009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2017.10.024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.08.003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2012.01.009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/1023697X.2012.10669006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_3"},{"key":"ref3","author":"schneier","year":"1996","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/81.904880"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00156-6"},{"key":"ref49","first-page":"1","article-title":"Multiple-reservoir scheduling using \n$\\beta$\n-hill climbing algorithm","author":"alsukni","year":"2017","journal-title":"J Intell Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5787-1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2328-2"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817600"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.11.026"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-070-4"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.88.6.2297"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2018.06.008"},{"key":"ref44","article-title":"SP 800&#x2013;22 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"bassham","year":"2010"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1063\/1.166092"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08479362.pdf?arnumber=8479362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:39:49Z","timestamp":1643225989000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8479362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2871557","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}