{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T06:08:42Z","timestamp":1769148522227,"version":"3.49.0"},"reference-count":42,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,11,30]],"date-time":"2019-11-30T00:00:00Z","timestamp":1575072000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,11,30]]},"abstract":"<jats:p>Substitution box (S-box) is a vital nonlinear component for the security of cryptographic schemes. In this paper, a new technique which involves coset diagrams for the action of a quotient of the modular group on the projective line over the finite field is proposed for construction of an S-box. It is constructed by selecting vertices of the coset diagram in a special manner. A useful transformation involving Fibonacci sequence is also used in selecting the vertices of the coset diagram. Finally, all the analyses to examine the security strength are performed. The outcomes of the analyses are encouraging and show that the generated S-box is highly secure.<\/jats:p>","DOI":"10.1155\/2019\/2847801","type":"journal-article","created":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T05:53:55Z","timestamp":1575266035000},"page":"1-13","source":"Crossref","is-referenced-by-count":27,"title":["Construction of New S-Box Using Action of Quotient of the Modular Group for Multimedia Security"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7645-164X","authenticated-orcid":true,"given":"Imran","family":"Shahzad","sequence":"first","affiliation":[{"name":"Department of Mathematics, Quaid-I-Azam University, Islamabad, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qaiser","family":"Mushtaq","sequence":"additional","affiliation":[{"name":"The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1898-4082","authenticated-orcid":true,"given":"Abdul","family":"Razaq","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Division of Science and Technology, University of Education, Lahore, Pakistan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.03.021"},{"key":"3","year":"1977"},{"key":"4","year":"2013"},{"issue":"3","key":"5","first-page":"751","volume":"3","year":"2007","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/bf00630563"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.5897\/IJPS11.531"},{"issue":"2","key":"8","first-page":"111","volume":"48","year":"2011","journal-title":"Proceedings of the Pakistan Academy of Sciences"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.08.0207.0188"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.3390\/e20070525"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.10.022"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.10.011"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1063\/1.4978264"},{"issue":"1","key":"16","first-page":"159","volume":"1","year":"1983","journal-title":"The Arab Gulf Journal of Scientific Research"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1017\/s000497270002685x"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.crma.2019.07.002"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1216\/jca-2010-2-4-501"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1080\/00927879208824389"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/81.904880"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.04.023"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2016.11.152"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-017-3409-1"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1142\/s0218127415501278"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5101934"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.3390\/app8122650"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2871557"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2012.01.009"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1080\/1023697x.2012.10669006"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.394"},{"issue":"1","key":"33","first-page":"232","volume":"27","year":"2016","journal-title":"Journal of Systems Engineering and Electronics"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2016.06.001"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3287-y"},{"issue":"171","key":"36","first-page":"1","volume":"30","year":"2018","journal-title":"Neural Computing and Applications"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2018.2846186"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2013.11.001"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3199-x"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-5054-x"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-3287-y"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-018-4478-5"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2018.03.019"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2911395"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1887-y"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3046-0"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/2847801.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/2847801.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/2847801.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T05:54:00Z","timestamp":1575266040000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/2847801\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,30]]},"references-count":42,"alternative-id":["2847801","2847801"],"URL":"https:\/\/doi.org\/10.1155\/2019\/2847801","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,30]]}}}