{"id":"https://openalex.org/W2921026504","doi":"https://doi.org/10.3390/sym11030351","title":"Construction of S-Box Based on Chaotic Map and Algebraic Structures","display_name":"Construction of S-Box Based on Chaotic Map and Algebraic Structures","publication_year":2019,"publication_date":"2019-03-08","ids":{"openalex":"https://openalex.org/W2921026504","doi":"https://doi.org/10.3390/sym11030351","mag":"2921026504"},"language":"en","primary_location":{"id":"doi:10.3390/sym11030351","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym11030351","pdf_url":"https://www.mdpi.com/2073-8994/11/3/351/pdf?version=1552031620","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/11/3/351/pdf?version=1552031620","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023526275","display_name":"Iqtadar Hussain","orcid":"https://orcid.org/0000-0002-2500-4214"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Iqtadar Hussain","raw_affiliation_strings":["Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040426455","display_name":"Amir Anees","orcid":"https://orcid.org/0009-0001-2085-587X"},"institutions":[{"id":"https://openalex.org/I29698356","display_name":"HITEC University","ror":"https://ror.org/013d87239","country_code":"PK","type":"education","lineage":["https://openalex.org/I29698356"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Amir Anees","raw_affiliation_strings":["Department of Electrical Engineering, HITEC University, Taxila 47080, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, HITEC University, Taxila 47080, Pakistan","institution_ids":["https://openalex.org/I29698356"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046692341","display_name":"Temadher Alassiry Al-Maadeed","orcid":"https://orcid.org/0000-0002-0308-2422"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Temadher Alassiry Al-Maadeed","raw_affiliation_strings":["Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113287681","display_name":"Muhammad Tahir Mustafa","orcid":null},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Muhammad Tahir Mustafa","raw_affiliation_strings":["Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023526275"],"corresponding_institution_ids":["https://openalex.org/I60342839"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":925,"currency":"EUR","value_usd":997},"fwci":3.9849,"has_fulltext":false,"cited_by_count":70,"citation_normalized_percentile":{"value":0.95016995,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"11","issue":"3","first_page":"351","last_page":"351"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.9083524942398071},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6486791372299194},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6401717662811279},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5782402753829956},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5472313165664673},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5422426462173462},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5125329494476318},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5090303421020508},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5032958388328552},{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.49378952383995056},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.4824243485927582},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.47839510440826416},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4737848937511444},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.4383479654788971},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.4299521744251251},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4163092374801636},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36565643548965454},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3583776354789734},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.17785784602165222},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.17027953267097473},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1640738844871521},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11072751879692078},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10173779726028442}],"concepts":[{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.9083524942398071},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6486791372299194},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6401717662811279},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5782402753829956},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5472313165664673},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5422426462173462},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5125329494476318},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5090303421020508},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5032958388328552},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.49378952383995056},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.4824243485927582},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.47839510440826416},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4737848937511444},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.4383479654788971},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.4299521744251251},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4163092374801636},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36565643548965454},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3583776354789734},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.17785784602165222},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.17027953267097473},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1640738844871521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11072751879692078},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10173779726028442},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.3390/sym11030351","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym11030351","pdf_url":"https://www.mdpi.com/2073-8994/11/3/351/pdf?version=1552031620","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:717d3e36a2b84eeebe00e5a09203006a","is_oa":true,"landing_page_url":"https://doaj.org/article/717d3e36a2b84eeebe00e5a09203006a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry, Vol 11, Iss 3, p 351 (2019)","raw_type":"article"},{"id":"pmh:oai:figshare.com:article/25406068","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Construction_of_S-Box_Based_on_Chaotic_Map_and_Algebraic_Structures/25406068","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:mdpi.com:/2073-8994/11/3/351/","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/sym11030351","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry","raw_type":"Text"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/14256","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/14256","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":{"id":"doi:10.3390/sym11030351","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym11030351","pdf_url":"https://www.mdpi.com/2073-8994/11/3/351/pdf?version=1552031620","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2921026504.pdf","grobid_xml":"https://content.openalex.org/works/W2921026504.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W147005573","https://openalex.org/W940512862","https://openalex.org/W1556212265","https://openalex.org/W1966443185","https://openalex.org/W1966880683","https://openalex.org/W1990612911","https://openalex.org/W2000093475","https://openalex.org/W2021109011","https://openalex.org/W2025266594","https://openalex.org/W2029194539","https://openalex.org/W2031169474","https://openalex.org/W2041628072","https://openalex.org/W2053771746","https://openalex.org/W2056942998","https://openalex.org/W2103238121","https://openalex.org/W2109394932","https://openalex.org/W2141394518","https://openalex.org/W2149234652","https://openalex.org/W2202320445","https://openalex.org/W2335461328","https://openalex.org/W2511586649","https://openalex.org/W2550758393","https://openalex.org/W2554114274","https://openalex.org/W2759899910","https://openalex.org/W2777414953","https://openalex.org/W2795447369","https://openalex.org/W2801689152","https://openalex.org/W2801737997","https://openalex.org/W2802184082","https://openalex.org/W2905383599","https://openalex.org/W3104142952"],"related_works":["https://openalex.org/W1539170589","https://openalex.org/W2071872706","https://openalex.org/W4384009156","https://openalex.org/W2608563892","https://openalex.org/W2152682287","https://openalex.org/W4324335473","https://openalex.org/W2767464073","https://openalex.org/W2044615812","https://openalex.org/W3142558777","https://openalex.org/W1607372077"],"abstract_inverted_index":{"The":[0,14,37,83,95,123],"Advanced":[1],"Encryption":[2],"Standard":[3],"(AES)":[4],"is":[5,18,41,45,89,98,130],"widely":[6],"used":[7,42,67],"in":[8,43,132],"different":[9],"kinds":[10],"of":[11,22,56],"security":[12],"applications.":[13],"substitution":[15],"box":[16],"(S-box)":[17],"the":[19,32,53,86,101,127],"main":[20],"component":[21,39,51],"many":[23],"modern":[24],"symmetric":[25,74],"encryption":[26,54],"ciphers":[27],"that":[28,40,126],"provides":[29],"confusion":[30],"between":[31],"secret":[33],"key":[34],"and":[35,73,118],"ciphertext.":[36],"S-box":[38,80,97,136],"AES":[44,57],"fixed.":[46],"If":[47],"we":[48,66],"construct":[49,79],"this":[50,64],"dynamically,":[52],"strength":[55],"would":[58],"be":[59],"greater":[60],"than":[61],"before.":[62],"In":[63],"manuscript,":[65],"chaotic":[68],"logistic":[69],"map,":[70],"Mobius":[71],"transformation":[72],"group":[75],"S":[76],"256":[77],"to":[78,90,137],"for":[81,100],"AES.":[82],"idea":[84],"behind":[85],"proposed":[87,128],"work":[88],"make":[91],"supplementary":[92],"safe":[93],"S-box.":[94],"presented":[96],"analyzed":[99],"following":[102],"analyses:":[103],"linear":[104],"approximation":[105,111],"probability":[106,112],"(LP),":[107],"nonlinearity":[108],"(NL),":[109],"differential":[110],"(DP),":[113],"strict":[114],"avalanche":[115],"criterion":[116,121],"(SAC),":[117],"bit":[119],"independence":[120],"(BIC).":[122],"analyses":[124],"show":[125],"technique":[129],"useful":[131],"generating":[133],"high":[134],"resistance":[135],"known":[138],"attacks.":[139]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":18},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
