{"id":"https://openalex.org/W2895283602","doi":"https://doi.org/10.1109/access.2018.2871557","title":"A New 1D Chaotic Map and &lt;inline-formula&gt; &lt;tex-math notation=\"LaTeX\"&gt;$\\beta$ &lt;/tex-math&gt; &lt;/inline-formula&gt;-Hill Climbing for Generating Substitution-Boxes","display_name":"A New 1D Chaotic Map and &lt;inline-formula&gt; &lt;tex-math notation=\"LaTeX\"&gt;$\\beta$ &lt;/tex-math&gt; &lt;/inline-formula&gt;-Hill Climbing for Generating Substitution-Boxes","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2895283602","doi":"https://doi.org/10.1109/access.2018.2871557","mag":"2895283602"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2871557","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2871557","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2018.2871557","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038934906","display_name":"Amer Alzaidi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"Jeddah University","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Amer Awad Alzaidi","raw_affiliation_strings":["Department of Information System, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information System, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053467873","display_name":"Musheer Ahmad","orcid":"https://orcid.org/0000-0002-4915-9325"},"institutions":[{"id":"https://openalex.org/I59475050","display_name":"Jamia Millia Islamia","ror":"https://ror.org/00pnhhv55","country_code":"IN","type":"education","lineage":["https://openalex.org/I59475050"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Musheer Ahmad","raw_affiliation_strings":["Department of Computer Engineering, Jamia Millia Islamia, New Delhi, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Jamia Millia Islamia, New Delhi, India","institution_ids":["https://openalex.org/I59475050"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109416705","display_name":"M. N. Doja","orcid":null},"institutions":[{"id":"https://openalex.org/I59475050","display_name":"Jamia Millia Islamia","ror":"https://ror.org/00pnhhv55","country_code":"IN","type":"education","lineage":["https://openalex.org/I59475050"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. N. Doja","raw_affiliation_strings":["Department of Computer Engineering, Jamia Millia Islamia, New Delhi, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Jamia Millia Islamia, New Delhi, India","institution_ids":["https://openalex.org/I59475050"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113855300","display_name":"Eesa Al Solami","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"Jeddah University","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Eesa Al Solami","raw_affiliation_strings":["Department of Information Technology, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055656153","display_name":"M. M. Sufyan Beg","orcid":"https://orcid.org/0000-0002-7639-139X"},"institutions":[{"id":"https://openalex.org/I171210897","display_name":"Aligarh Muslim University","ror":"https://ror.org/03kw9gc02","country_code":"IN","type":"education","lineage":["https://openalex.org/I171210897"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. M. Sufyan Beg","raw_affiliation_strings":["Department of Computer Engineering, Aligarh Muslim University, Aligarh, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Aligarh Muslim University, Aligarh, India","institution_ids":["https://openalex.org/I171210897"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5038934906"],"corresponding_institution_ids":["https://openalex.org/I4210099699"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":5.9541,"has_fulltext":false,"cited_by_count":104,"citation_normalized_percentile":{"value":0.97258648,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"6","issue":null,"first_page":"55405","last_page":"55418"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.7506313323974609},{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.684975266456604},{"id":"https://openalex.org/keywords/lyapunov-exponent","display_name":"Lyapunov exponent","score":0.6752171516418457},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.6071091890335083},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5423998236656189},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5006248950958252},{"id":"https://openalex.org/keywords/hill-climbing","display_name":"Hill climbing","score":0.4697841703891754},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.46504154801368713},{"id":"https://openalex.org/keywords/substitution","display_name":"Substitution (logic)","score":0.4532838463783264},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.41019734740257263},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3635921776294708},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3536372184753418},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3375619351863861},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.2665358781814575},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15324130654335022}],"concepts":[{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.7506313323974609},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.684975266456604},{"id":"https://openalex.org/C191544260","wikidata":"https://www.wikidata.org/wiki/Q1238630","display_name":"Lyapunov exponent","level":3,"score":0.6752171516418457},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6071091890335083},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5423998236656189},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5006248950958252},{"id":"https://openalex.org/C135450995","wikidata":"https://www.wikidata.org/wiki/Q820272","display_name":"Hill climbing","level":2,"score":0.4697841703891754},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.46504154801368713},{"id":"https://openalex.org/C2778220771","wikidata":"https://www.wikidata.org/wiki/Q1522579","display_name":"Substitution (logic)","level":2,"score":0.4532838463783264},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.41019734740257263},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3635921776294708},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3536372184753418},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3375619351863861},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.2665358781814575},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15324130654335022},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2018.2871557","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2871557","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:22b210e380814106868f3e179552f5aa","is_oa":true,"landing_page_url":"https://doaj.org/article/22b210e380814106868f3e179552f5aa","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 55405-55418 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2871557","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2871557","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":70,"referenced_works":["https://openalex.org/W88477866","https://openalex.org/W110767368","https://openalex.org/W115326044","https://openalex.org/W162464270","https://openalex.org/W577451423","https://openalex.org/W601637684","https://openalex.org/W948344519","https://openalex.org/W1458436632","https://openalex.org/W1491783759","https://openalex.org/W1556727271","https://openalex.org/W1583753474","https://openalex.org/W1585665690","https://openalex.org/W1595334710","https://openalex.org/W1629301835","https://openalex.org/W1670558497","https://openalex.org/W1764851859","https://openalex.org/W1906499095","https://openalex.org/W1964723977","https://openalex.org/W1969282372","https://openalex.org/W2009229700","https://openalex.org/W2023892116","https://openalex.org/W2025266594","https://openalex.org/W2029030701","https://openalex.org/W2031377725","https://openalex.org/W2034160174","https://openalex.org/W2046398750","https://openalex.org/W2064827704","https://openalex.org/W2065383271","https://openalex.org/W2077204677","https://openalex.org/W2089963432","https://openalex.org/W2102892532","https://openalex.org/W2104513725","https://openalex.org/W2109394932","https://openalex.org/W2120706888","https://openalex.org/W2168108969","https://openalex.org/W2234576048","https://openalex.org/W2341029569","https://openalex.org/W2343247866","https://openalex.org/W2471234984","https://openalex.org/W2488638828","https://openalex.org/W2492879327","https://openalex.org/W2528238038","https://openalex.org/W2550188394","https://openalex.org/W2566287062","https://openalex.org/W2589877885","https://openalex.org/W2605543710","https://openalex.org/W2609722788","https://openalex.org/W2743732015","https://openalex.org/W2745264798","https://openalex.org/W2751740819","https://openalex.org/W2768240224","https://openalex.org/W2768497671","https://openalex.org/W2770531757","https://openalex.org/W2774350692","https://openalex.org/W2794004503","https://openalex.org/W2794630318","https://openalex.org/W2799941070","https://openalex.org/W2807514626","https://openalex.org/W2821393409","https://openalex.org/W2851867480","https://openalex.org/W2883839991","https://openalex.org/W2884783699","https://openalex.org/W3105084426","https://openalex.org/W4298109338","https://openalex.org/W4302771278","https://openalex.org/W6603572560","https://openalex.org/W6604454213","https://openalex.org/W6722717330","https://openalex.org/W6752905011","https://openalex.org/W6753536001"],"related_works":["https://openalex.org/W3111883714","https://openalex.org/W3186222870","https://openalex.org/W2951182675","https://openalex.org/W3111547351","https://openalex.org/W2542960427","https://openalex.org/W3159256893","https://openalex.org/W3210773817","https://openalex.org/W3005443238","https://openalex.org/W2061342071","https://openalex.org/W3001135238"],"abstract_inverted_index":{"One-dimensional":[0],"(1-D)":[1],"chaotic":[2,48,53,69,115],"maps":[3],"have":[4,19],"been":[5,95],"considered":[6],"as":[7,82],"prominent":[8,97],"pseudo-random":[9],"source":[10],"for":[11,101],"the":[12,20,52,106,113,132,148],"design":[13],"of":[14,22,99,127,159],"different":[15],"cryptographic":[16],"primitives.":[17],"They":[18],"advantages":[21],"simplicity,":[23],"easy":[24],"to":[25,60,85,123,145],"implement,":[26],"and":[27,46,71,89],"low":[28],"computation.":[29],"This":[30],"paper":[31],"proposes":[32],"a":[33,58,96],"new":[34],"1-D":[35],"discrete-chaotic":[36],"map":[37,70],"which":[38],"holds":[39],"better":[40],"dynamical":[41],"behavior,":[42],"lyapunov":[43],"exponent,":[44],"bifurcation,":[45],"larger":[47],"range":[49],"compared":[50,139],"with":[51,140],"logistic":[54],"map.":[55,116],"We":[56],"propose":[57],"method":[59,108],"construct":[61],"cryptographically":[62],"efficient":[63],"substitution-boxes":[64],"(S-boxes)":[65],"using":[66,112],"an":[67],"improved":[68,114],"\u03b2-hill":[72,118],"climbing":[73,119],"search":[74,120],"technique.":[75],"S-boxes":[76,93,143],"are":[77,138],"used":[78],"in":[79,154],"block":[80,160],"ciphers":[81],"nonlinear":[83,157],"components":[84],"bring":[86],"strong":[87,156],"confusion":[88],"security.":[90],"Constructing":[91],"optimal":[92],"has":[94],"topic":[98],"interest":[100],"security":[102],"experts.":[103],"To":[104],"begin,":[105],"anticipated":[107],"generates":[109],"initial":[110],"S-box":[111,128],"Then,":[117],"is":[121,151],"applied":[122],"obtain":[124],"notable":[125],"configuration":[126],"that":[129,147],"optimally":[130],"satisfies":[131],"fitness":[133],"function.":[134],"The":[135],"simulation":[136],"results":[137],"some":[141],"recent":[142],"approaches":[144],"demonstrate":[146],"proposed":[149],"approach":[150],"more":[152],"proficient":[153],"generating":[155],"component":[158],"encryption":[161],"systems.":[162]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":23},{"year":2020,"cited_by_count":21},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2018-10-12T00:00:00"}
