{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T09:47:51Z","timestamp":1775209671911,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004242","name":"Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia","doi-asserted-by":"publisher","award":["PNURSP2023R231"],"award-info":[{"award-number":["PNURSP2023R231"]}],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3337443","type":"journal-article","created":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T19:24:36Z","timestamp":1701199476000},"page":"135880-135890","source":"Crossref","is-referenced-by-count":32,"title":["A Robust S Box Design Using Cyclic Groups and Image Encryption"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5255-9088","authenticated-orcid":false,"given":"Rashad","family":"Ali","sequence":"first","affiliation":[{"name":"Department of Mathematics, Riphah International University, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5715-9299","authenticated-orcid":false,"given":"Muhammad Kamran","family":"Jamil","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Riphah International University, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7856-2861","authenticated-orcid":false,"given":"Amal S.","family":"Alali","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, College of Science, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia"}]},{"given":"Javed","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Riphah International University, Lahore, Pakistan"}]},{"given":"Gulraiz","family":"Afzal","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Riphah International University, Lahore, Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES\u2014The Advanced Encryption Standard","author":"Daeman","year":"2002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4772-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-0914-5"},{"issue":"2","key":"ref5","first-page":"1779","article-title":"Construction of new S-box using a linear fractional transformation","volume":"14","author":"Hussain","year":"2011","journal-title":"World Appl. Sci."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/e20120913"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4987021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0646-1"},{"issue":"8","key":"ref9","first-page":"810","article-title":"A novel construction of S16 AES S-box","volume":"14","author":"Siddiqui","year":"2016","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-0870-0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5101934"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5823230"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-5054-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography3010006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2846186"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/e21030245"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.2019-0138"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2847801"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6969312"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"ref21","first-page":"137","article-title":"Avalanch and bit independence properties for the ensembles of randomly chosen n\u00d7n S-boxes","volume":"9","author":"Vergili","year":"2001","journal-title":"Turkish J. Electr. Eng. Comput. Sci."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168610"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/ip-e.1988.0044"},{"key":"ref25","article-title":"On the design of S-boxes, advances in cryptology","volume-title":"Proc. CRYPTO","author":"Webster"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970806"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871557"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1080\/1023697X.2012.10669006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2013.11.001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/sym12050826"},{"issue":"4","key":"ref31","first-page":"105","article-title":"Construction of highly nonlinear substitution boxes (S-boxes) based on connected regular graphs","volume":"18","author":"Arshad","year":"2020","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0241890"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/sym11030437"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.025"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3095618"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/aic-mitcsa.2016.7759926"},{"issue":"4","key":"ref37","first-page":"1","article-title":"A new DNA-based S-box","volume":"15","author":"Al-Wattar","year":"2015","journal-title":"Int. J. Eng. Technol."},{"issue":"2","key":"ref38","first-page":"19","article-title":"Secure data transfer through DNA cryptography using symmetric algorithm","volume":"133","author":"Frank","year":"2016","journal-title":"Int. J. Comput. Appl."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1912859"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3230141"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989676"},{"key":"ref42","article-title":"International data encryption algorithm","author":"Masseyand","year":"2023"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3077194"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.5392\/IJoC.2015.11.4.056"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i5.pp3996-4007"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2021275"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/e18080276"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01385-0"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4310-2"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972622"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08282-w"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925081"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/sym12091497"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2017.10.024"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.5120\/9925-4549"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2022.901800"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8694678"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9508749"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/275818"},{"issue":"34","key":"ref60","first-page":"1","article-title":"A novel image encryption based on bit-shuffled improved tent map","volume":"9","author":"Gupta","year":"2016","journal-title":"Int. J. Control Theory Appl."},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982567"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10429-z"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11635-z"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.164884"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-018-9298-8"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118845"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.3390\/sym11030351"},{"issue":"1","key":"ref68","first-page":"1","article-title":"Image encryption using generalized feedback shift register, S-box and elliptic curve cryptosystem (GFSR-EC-SB)","volume":"17","author":"Kaliswaran","year":"2023","journal-title":"Image"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3143096"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2023.170590"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10332185.pdf?arnumber=10332185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T21:56:29Z","timestamp":1703022989000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10332185\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3337443","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}