共 26 条
[1]
Shannon C.E., Communication theory of secrecy systems, Bell Systems Technical Journal, 28, pp. 656-715, (1949)
[2]
Biham E., Shamir A., Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, 4, 1, pp. 3-72, (1991)
[3]
Matsui M., Linear cryptanalysis method for DES cipher, Proceedings of EUROCRYPT’93, pp. 386-397, (1998)
[4]
Kim J., Phan R.C.W., Advanced differential-style crypt-analysis of the NSA’s skipjack block cipher, Cryptologia, 33, 3, pp. 246-270, (2009)
[5]
Hussain I., Shah T., Gondal M.A., Khan W.A., Mahmood H., A group theoretic approach to construct cryptographically strong substitution boxes, Neural Computing and Applications, 23, 1, pp. 97-104, (2013)
[6]
Farwa S., Shah T., Idrees L., A highly nonlinear S-box based on a fractional linear transformation, SpringerPlus, 5, (2016)
[7]
Xu Z.H., Shen G., Lin S., Image encryption algorithm based on chaos and S-boxes scrambling, Advance Materials Research, (2011)
[8]
Rehman A.U., Khan J.S., Ahmad J., A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps, 3D Research, 7, (2016)
[9]
Jamal S.S., Khan M.U., Shah T., A watermarking technique with chaotic fractional S-box transformation, Wireless Personal Communications, 90, 4, pp. 2033-2049, (2016)
[10]
Zhang Y., Xiao D., Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack, Nonlinear Dynamics, 72, 4, (2013)