{"id":"https://openalex.org/W2551603801","doi":"https://doi.org/10.1109/iscisc.2016.7736443","title":"Construction of new S-boxes via permuting the inverse mapping on special subsets","display_name":"Construction of new S-boxes via permuting the inverse mapping on special subsets","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2551603801","doi":"https://doi.org/10.1109/iscisc.2016.7736443","mag":"2551603801"},"language":"en","primary_location":{"id":"doi:10.1109/iscisc.2016.7736443","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc.2016.7736443","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007814600","display_name":"Seyed Mojtaba Dehnavi","orcid":null},"institutions":[{"id":"https://openalex.org/I181744264","display_name":"Kharazmi University","ror":"https://ror.org/05hsgex59","country_code":"IR","type":"education","lineage":["https://openalex.org/I181744264"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"S.M. Dehnavi","raw_affiliation_strings":["Kharazmi University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Kharazmi University, Tehran, Iran","institution_ids":["https://openalex.org/I181744264"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070402658","display_name":"M. R. Mirzaee Shamsabad","orcid":null},"institutions":[{"id":"https://openalex.org/I48379061","display_name":"Shahid Beheshti University","ror":"https://ror.org/0091vmj44","country_code":"IR","type":"education","lineage":["https://openalex.org/I48379061"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"M.R. Mirzaee Shamsabad","raw_affiliation_strings":["Shahid Beheshti University, Tehran, Tehran, IR"],"affiliations":[{"raw_affiliation_string":"Shahid Beheshti University, Tehran, Tehran, IR","institution_ids":["https://openalex.org/I48379061"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021663385","display_name":"Akbar Mahmoodi Rishakani","orcid":null},"institutions":[{"id":"https://openalex.org/I83123760","display_name":"Shahid Rajaee Teacher Training University","ror":"https://ror.org/02nkz4493","country_code":"IR","type":"education","lineage":["https://openalex.org/I83123760"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"A. Mahmoodi Rishakani","raw_affiliation_strings":["Shahid Rajaee Teacher Training University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Shahid Rajaee Teacher Training University, Tehran, Iran","institution_ids":["https://openalex.org/I83123760"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007814600"],"corresponding_institution_ids":["https://openalex.org/I181744264"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07632433,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"731","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/inverse","display_name":"Inverse","score":0.6355187296867371},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6031484007835388},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.48498937487602234},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4582260549068451},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3679999113082886},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34329313039779663},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.33637213706970215}],"concepts":[{"id":"https://openalex.org/C207467116","wikidata":"https://www.wikidata.org/wiki/Q4385666","display_name":"Inverse","level":2,"score":0.6355187296867371},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6031484007835388},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.48498937487602234},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4582260549068451},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3679999113082886},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34329313039779663},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33637213706970215},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscisc.2016.7736443","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc.2016.7736443","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W103329842","https://openalex.org/W338134916","https://openalex.org/W1528065150","https://openalex.org/W1629301835","https://openalex.org/W1964723977","https://openalex.org/W2008116785","https://openalex.org/W2134000511","https://openalex.org/W2610262450","https://openalex.org/W2762372452","https://openalex.org/W6611578907","https://openalex.org/W6631450893","https://openalex.org/W6641304879","https://openalex.org/W6745027089"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2053286651","https://openalex.org/W2980963558","https://openalex.org/W2181743346","https://openalex.org/W2187401768","https://openalex.org/W2181413294","https://openalex.org/W2989452537","https://openalex.org/W2052122378"],"abstract_inverted_index":{"S-boxes":[0,46,96],"are":[1,94],"crucial":[2],"components":[3],"of":[4,18,45,73],"symmetric":[5],"ciphers.":[6],"In":[7,77],"this":[8,39],"article,":[9],"firstly":[10],"we":[11,41,80],"examine":[12],"the":[13,53,70,74],"nonlinearity":[14],"and":[15],"differential":[16],"uniformity":[17],"mappings":[19,24],"obtained":[20],"via":[21],"switching":[22],"given":[23],"over":[25,56,85],"F":[26,57,86],"<sub":[27,58,87],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[28,31,59,62,88,91],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sub>":[29,60,89],"<sup":[30,61,90],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</sup>":[32,63,92],",":[33],"on":[34,64],"arbitrary":[35],"subsets.":[36,67],"Then,":[37],"using":[38],"investigation,":[40],"construct":[42],"new":[43,82],"families":[44],"with":[47],"good":[48],"cryptographic":[49,98],"properties,":[50],"through":[51],"permuting":[52],"inverse":[54],"mapping":[55],"some":[65],"special":[66],"We":[68],"provide":[69],"polynomial":[71],"representation":[72],"proposed":[75],"S-boxes.":[76],"other":[78],"words,":[79],"present":[81],"permutation":[83],"polynomials":[84],"which":[93],"strong":[95],"from":[97],"aspect.":[99]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
