{"id":"https://openalex.org/W3111282759","doi":"https://doi.org/10.1109/access.2020.3045260","title":"A Novel Optimization Method for Constructing Cryptographically Strong Dynamic S-Boxes","display_name":"A Novel Optimization Method for Constructing Cryptographically Strong Dynamic S-Boxes","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3111282759","doi":"https://doi.org/10.1109/access.2020.3045260","mag":"3111282759"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3045260","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3045260","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09296204.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09296204.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044827655","display_name":"Saleh Ibrahim","orcid":"https://orcid.org/0000-0002-7135-9366"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]},{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["EG","SA"],"is_corresponding":true,"raw_author_name":"Saleh Ibrahim","raw_affiliation_strings":["Computer Engineering Department, Faculty of Engineering, Cairo University, Giza, Egypt","Department of Electrical Engineering, College of Engineering, Taif University, Al-Hawiya, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-7135-9366","affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Faculty of Engineering, Cairo University, Giza, Egypt","institution_ids":["https://openalex.org/I145487455"]},{"raw_affiliation_string":"Department of Electrical Engineering, College of Engineering, Taif University, Al-Hawiya, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088865393","display_name":"Alaa M. Abbas","orcid":"https://orcid.org/0000-0003-0929-161X"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]},{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG","SA"],"is_corresponding":false,"raw_author_name":"Alaa M. Abbas","raw_affiliation_strings":["Department of Electrical Engineering, College of Engineering, Taif University, Al-Hawiya, Saudi Arabia","Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"raw_orcid":"https://orcid.org/0000-0003-0929-161X","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, College of Engineering, Taif University, Al-Hawiya, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]},{"raw_affiliation_string":"Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044827655"],"corresponding_institution_ids":["https://openalex.org/I145487455","https://openalex.org/I179331831"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.9039,"has_fulltext":true,"cited_by_count":33,"citation_normalized_percentile":{"value":0.89143917,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"8","issue":null,"first_page":"225004","last_page":"225017"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.8104586601257324},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6445600986480713},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5783095955848694},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.550049901008606},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.4953833818435669},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.47753798961639404},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.46960127353668213},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.4590221345424652},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4365706741809845},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.4305543899536133},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.37675750255584717},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2793327271938324},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11999580264091492}],"concepts":[{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.8104586601257324},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6445600986480713},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5783095955848694},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.550049901008606},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.4953833818435669},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.47753798961639404},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.46960127353668213},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.4590221345424652},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4365706741809845},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.4305543899536133},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.37675750255584717},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2793327271938324},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11999580264091492},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.3045260","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3045260","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09296204.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6e9ce31808b1483a809a7a4a3b9d2c8b","is_oa":true,"landing_page_url":"https://doaj.org/article/6e9ce31808b1483a809a7a4a3b9d2c8b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 225004-225017 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3045260","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3045260","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09296204.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3111282759.pdf","grobid_xml":"https://content.openalex.org/works/W3111282759.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W1458436632","https://openalex.org/W1572300106","https://openalex.org/W1587697857","https://openalex.org/W1738474334","https://openalex.org/W1889322616","https://openalex.org/W2074268081","https://openalex.org/W2089963432","https://openalex.org/W2285315122","https://openalex.org/W2323473128","https://openalex.org/W2463352023","https://openalex.org/W2492879327","https://openalex.org/W2495307633","https://openalex.org/W2518307365","https://openalex.org/W2550188394","https://openalex.org/W2559489000","https://openalex.org/W2566287062","https://openalex.org/W2765497248","https://openalex.org/W2774350692","https://openalex.org/W2791539936","https://openalex.org/W2795060769","https://openalex.org/W2799941070","https://openalex.org/W2808755199","https://openalex.org/W2821393409","https://openalex.org/W2883839991","https://openalex.org/W2886687749","https://openalex.org/W2895283602","https://openalex.org/W2899601674","https://openalex.org/W2902835214","https://openalex.org/W2904798530","https://openalex.org/W2916974458","https://openalex.org/W2919954404","https://openalex.org/W2923032343","https://openalex.org/W2924233255","https://openalex.org/W2943221465","https://openalex.org/W2955214321","https://openalex.org/W2990908914","https://openalex.org/W2996335605","https://openalex.org/W2997069489","https://openalex.org/W3003721113","https://openalex.org/W3004257937","https://openalex.org/W3006427436","https://openalex.org/W3012385585","https://openalex.org/W3018470964","https://openalex.org/W3035231109","https://openalex.org/W3036166288","https://openalex.org/W3081530559"],"related_works":["https://openalex.org/W1985115047","https://openalex.org/W4220893301","https://openalex.org/W2986543571","https://openalex.org/W2919954404","https://openalex.org/W2955579865","https://openalex.org/W2534971686","https://openalex.org/W2387168119","https://openalex.org/W377307689","https://openalex.org/W2321159322","https://openalex.org/W2119152099"],"abstract_inverted_index":{"The":[0,53,76,150],"resistance":[1],"of":[2,21,50,69,103,112,173,194],"S-box-based":[3],"cryptosystems":[4],"to":[5,61,86,179,190],"linear":[6,17],"cryptanalysis":[7],"is":[8,32,161],"often":[9],"determined":[10],"by":[11],"the":[12,16,22,48,67,81,91,99,115,117,163,171,174,192],"nonlinearity":[13,31,68],"(NL)":[14],"and":[15,65,110,201],"approximation":[18],"probability":[19],"(LAP)":[20],"underlying":[23],"S-box.":[24],"Constructing":[25],"dynamic":[26,104,123],"bijective":[27],"S-boxes":[28,64,157],"with":[29,127,158],"high":[30],"a":[33,41,57,95,121,133],"challenging":[34],"problem.":[35],"In":[36],"this":[37],"paper,":[38],"we":[39,169,186],"propose":[40,187],"novel":[42],"S-box":[43,82,88,126,135,182,196],"construction":[44,83,89],"method":[45,55,93,119,152],"based":[46],"on":[47],"concept":[49],"constrained":[51,176],"optimization.":[52],"proposed":[54,77,92,118,151,175],"uses":[56],"random-restart":[58],"hill-climbing":[59],"algorithm":[60,78,189],"construct":[62],"randomized":[63],"maximize":[66],"each":[70],"Boolean":[71],"function":[72],"under":[73],"bijectivity":[74],"constraints.":[75],"dramatically":[79],"reduced":[80],"time.":[84],"Compared":[85],"recent":[87],"methods,":[90],"strikes":[94],"better":[96],"balance":[97],"among":[98,162],"three":[100],"design":[101,183],"objectives":[102],"S-boxes,":[105],"namely,":[106],"cryptographic":[107],"strength,":[108],"dynamicity,":[109],"speed":[111],"construction.":[113],"On":[114],"average,":[116],"constructs":[120,154],"new":[122],"$8\\times":[124,155],"8$":[125,156],"NL=112":[128],"every":[129],"118":[130],"ms,":[131,141],"whereas":[132],"NL=110":[134],"can":[136],"be":[137],"generated":[138],"in":[139,166],"5.3":[140],"which":[142,160],"makes":[143],"it":[144],"suitable":[145],"for":[146],"real":[147],"time":[148],"applications.":[149],"also":[153],"NL=114,":[159],"highest":[164],"reported":[165],"literature.":[167],"Moreover,":[168],"demonstrate":[170],"extensibility":[172],"optimization":[177],"formulation":[178],"improve":[180],"other":[181],"criteria.":[184],"Namely,":[185],"an":[188,195],"optimize":[191],"LAP":[193],"while":[197],"preserving":[198],"its":[199],"NL":[200],"bijectivity.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
