{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:56:04Z","timestamp":1773932164547,"version":"3.50.1"},"reference-count":32,"publisher":"World Scientific Pub Co Pte Ltd","issue":"11","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61662073"],"award-info":[{"award-number":["61662073"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Bifurcation Chaos"],"published-print":{"date-parts":[[2022,9,15]]},"abstract":"<jats:p> Cryptanalysis of key expansion algorithms in AES and SM4 revealed that (1) there exists weaknesses in their S-Boxes, and (2) the round key expansion algorithm is reversible, i.e. the initial key can be recovered from any round key, which may be explored by the attacker. To solve these problems, first we constructed a nondegenerate 2D exponential hyper chaotic map (2D-EQCM), derived a recursion formula to calculate the number of S-Boxes, and designed a strong S-Box construction algorithm without such weakness. Then based on 2D-EQCM and S-Box, we designed an irreversible parallel key expansion algorithm, which could transform the initial key to any number of relatively independent round keys. Security and statistical analysis demonstrated the flexibility and effectiveness of the proposed irreversible parallel key expansion algorithm. <\/jats:p>","DOI":"10.1142\/s0218127422501632","type":"journal-article","created":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T08:12:40Z","timestamp":1664439160000},"source":"Crossref","is-referenced-by-count":23,"title":["Constructing Strong S-Box by 2D Chaotic Map with Application to Irreversible Parallel Key Expansion"],"prefix":"10.1142","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1837-1435","authenticated-orcid":false,"given":"Hongjun","family":"Liu","sequence":"first","affiliation":[{"name":"Mathematical Sciences School, University of Jinan, Jinan 250022, P. R. China"}]},{"given":"Xingyuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Information Science and Technology School, Dalian Maritime University, Dalian 116026, P. R. China"}]},{"given":"Mengdi","family":"Zhao","sequence":"additional","affiliation":[{"name":"Mathematical Sciences School, University of Jinan, Jinan 250022, P. R. China"}]},{"given":"Yujun","family":"Niu","sequence":"additional","affiliation":[{"name":"Software Engineering School, Dalian University, Dalian 116622, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2022,9,26]]},"reference":[{"key":"S0218127422501632BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10048-8"},{"key":"S0218127422501632BIB002","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(18)30025-3"},{"key":"S0218127422501632BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/IWCFTA.2012.81"},{"key":"S0218127422501632BIB004","first-page":"231","volume":"22","author":"Daemen J.","year":"2002","journal-title":"Inform. Secur. Cryptog."},{"key":"S0218127422501632BIB005","series-title":"Advances in Cryptology-AUSCRYPT\u201992","first-page":"165","volume-title":"Int. Workshop on the Theory and Application of Cryptographic Techniques","author":"Detombe J.","year":"1992"},{"key":"S0218127422501632BIB006","volume-title":"100 Great Problems of Elementary Mathematics","author":"Doerrie H.","year":"1965"},{"key":"S0218127422501632BIB007","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2013.11.001"},{"key":"S0218127422501632BIB008","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-021-06308-3"},{"key":"S0218127422501632BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.01.014"},{"key":"S0218127422501632BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/s00354-016-0302-2"},{"key":"S0218127422501632BIB011","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-020-05503-y"},{"key":"S0218127422501632BIB012","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"key":"S0218127422501632BIB014","doi-asserted-by":"publisher","DOI":"10.3390\/app8122650"},{"key":"S0218127422501632BIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2019.04.078"},{"key":"S0218127422501632BIB016","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127420501734"},{"key":"S0218127422501632BIB017","first-page":"125153","volume":"376","author":"Liu H.","year":"2020","journal-title":"Appl. Math. Comput."},{"key":"S0218127422501632BIB018","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05849-4"},{"key":"S0218127422501632BIB019","doi-asserted-by":"publisher","DOI":"10.3390\/e21101004"},{"key":"S0218127422501632BIB020","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105836"},{"key":"S0218127422501632BIB021","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.12.065"},{"key":"S0218127422501632BIB022","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3004526"},{"key":"S0218127422501632BIB023","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104229"},{"key":"S0218127422501632BIB024","doi-asserted-by":"publisher","DOI":"10.1142\/S0217979220500149"},{"key":"S0218127422501632BIB025","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2016.7744197"},{"key":"S0218127422501632BIB026","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.05.018"},{"key":"S0218127422501632BIB027","doi-asserted-by":"publisher","DOI":"10.1152\/ajpheart.2000.278.6.H2039"},{"key":"S0218127422501632BIB028","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110366"},{"key":"S0218127422501632BIB029","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.36.4456"},{"key":"S0218127422501632BIB030","first-page":"76","volume":"2","author":"Wang C.","year":"2017","journal-title":"Acta Phys. Sin-Ch. Ed."},{"key":"S0218127422501632BIB031","first-page":"289","volume":"10","author":"Wang J.","year":"2019","journal-title":"J. Inf. Hiding Multim. Sign. Process"},{"key":"S0218127422501632BIB032","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.025"},{"key":"S0218127422501632BIB033","doi-asserted-by":"publisher","DOI":"10.1142\/S021812742250081X"}],"container-title":["International Journal of Bifurcation and Chaos"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218127422501632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T08:20:39Z","timestamp":1664439639000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218127422501632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,15]]},"references-count":32,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,9,15]]}},"alternative-id":["10.1142\/S0218127422501632"],"URL":"https:\/\/doi.org\/10.1142\/s0218127422501632","relation":{},"ISSN":["0218-1274","1793-6551"],"issn-type":[{"value":"0218-1274","type":"print"},{"value":"1793-6551","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,15]]},"article-number":"2250163"}}