<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Evolutionary approach to S-box generation: Optimizing nonlinear substitutions in symmetric ciphers⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Kuznetsov</string-name>
          <email>oleksandr.kuznetsov@uniecampus.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nikolay Poluyanenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emanuele Frontoni</string-name>
          <email>emanuele.frontoni@unimc.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Arnesano</string-name>
          <email>marco.arnesano@uniecampus.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Smirnov</string-name>
          <email>dr.smirnovoa@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CQPC-2024: Classic</institution>
          ,
          <addr-line>Quantum, and Post-Quantum Cryptography</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Central Ukrainian National Technical University</institution>
          ,
          <addr-line>8 University ave., 25006 Kropyvnytskyi</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Macerata</institution>
          ,
          <addr-line>30/32 Via Crescimbeni, 62100 Macerata</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>4 Svobody sq., 61022 Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>eCampus University</institution>
          ,
          <addr-line>10 Via Isimbardi, 22060 Novedrate</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This study explores the application of genetic algorithms in generating highly nonlinear substitution boxes (S-boxes) for symmetric key cryptography. We present a novel implementation that combines a genetic algorithm with the Walsh-Hadamard Spectrum (WHS) cost function to produce 8×8 S-boxes with a nonlinearity of 104. Our approach achieves performance parity with the best-known methods, requiring an average of 49,399 iterations with a 100% success rate. The study demonstrates significant improvements over earlier genetic algorithm implementations in this field, reducing iteration counts by orders of magnitude. By achieving equivalent performance through a different algorithmic approach, our work expands the toolkit available to cryptographers and highlights the potential of genetic methods in cryptographic primitive generation. The adaptability and parallelization potential of genetic algorithms suggests promising avenues for future research in S-box generation, potentially leading to more robust, efficient, and innovative cryptographic systems. Our findings contribute to the ongoing evolution of symmetric key cryptography, offering new perspectives on optimizing critical components of secure communication systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;S-box generation</kwd>
        <kwd>genetic algorithms</kwd>
        <kwd>nonlinear substitutions</kwd>
        <kwd>Walsh-Hadamard spectrum</kwd>
        <kwd>cryptographic primitives</kwd>
        <kwd>heuristic optimization</kwd>
        <kwd>cryptographic strength1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The realm of digital security is in a constant state of
evolution, with symmetric key cryptography serving as a
fundamental pillar in the architecture of secure
communication systems [1–3]. At the core of many
symmetric encryption algorithms lie Substitution boxes
(Sboxes) [4], which play a pivotal role in establishing the
nonlinear components essential for robust encryption [5, 6].
These S-boxes are critical in creating the confusion and
diffusion properties that Claude Shannon identified as
crucial for secure ciphers [7, 8].</p>
      <p>
        The cryptographic strength of an S-box is multifaceted,
encompassing several key indicators [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Nonlinearity,
which quantifies an S-box’s resistance to linear
cryptanalysis, stands as a primary measure. For 8×8 S-boxes,
commonly employed in modern ciphers, achieving a
nonlinearity of 104 represents a significant benchmark [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10–
12</xref>
        ]. However, other properties such as differential
uniformity, algebraic degree, and algebraic immunity also
play crucial roles in determining an S-box’s overall
cryptographic efficacy [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ].
      </p>
      <p>
        While algebraically constructed S-boxes, such as the one
used in the Advanced Encryption Standard (AES) with its
optimal nonlinearity of 112 [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], might seem ideal, they are
not without vulnerabilities. The presence of inherent
algebraic structures in such S-boxes can create potential
weaknesses, making them susceptible to algebraic
cryptanalysis [
        <xref ref-type="bibr" rid="ref16 ref17 ref18">16–18</xref>
        ]. This vulnerability underscores the
need for randomly generated S-boxes that lack hidden
algebraic structures, thereby enhancing resistance against
sophisticated cryptanalytic techniques [
        <xref ref-type="bibr" rid="ref19 ref20 ref21">19–21</xref>
        ].
      </p>
      <p>
        The generation of cryptographically robust S-boxes
presents a significant computational challenge. The vast
search space of possible configurations for 8×8 S-boxes is
estimated at 28! (approximately 10506), renders exhaustive
search methods impractical. This complexity has driven
research towards heuristic approaches for S-box generation
[
        <xref ref-type="bibr" rid="ref22 ref23 ref24">22–24</xref>
        ]. Methods such as simulated annealing, hill
climbing, and genetic algorithms have shown promise in
navigating this expansive solution space efficiently [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>0000-0003-2331-6326 (O. Kuznetsov); 0000-0001-9386-2547
(N. Poluyanenko); 0000-0002-8893-9244 (E. Frontoni);
0000-0003-17003075 (M. Arnesano); 0000-0001-9543-874X (O. Smirnov)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).</p>
      <p>
        Recent advances in heuristic S-box generation have made
significant advances. Researchers have studied various cost
functions, including the Walsh-Hadamard spectrum (WHS)
function [
        <xref ref-type="bibr" rid="ref23 ref26">23, 26</xref>
        ], the Picek cost function (PCF) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ],
improved Walsh-Hadamard spectrum-based cost functions
(WCF) [
        <xref ref-type="bibr" rid="ref10 ref27">10, 27</xref>
        ], and two new extended cost functions (ECF
and WCFS) [
        <xref ref-type="bibr" rid="ref28 ref29">6, 28, 29</xref>
        ] in conjunction with different search
algorithms [
        <xref ref-type="bibr" rid="ref10 ref22">10, 22</xref>
        ]. These efforts have progressively
reduced the computational cost of generating highly
nonlinear S-boxes, with some methods achieving the target
nonlinearity of 104 in fewer than 100,000 iterations.
      </p>
      <p>Despite these advancements, there remains a gap in
understanding the full potential of genetic algorithms in this
domain. While genetic approaches have been applied to
Sbox generation, their performance in comparison to other
heuristic methods, particularly in terms of consistency and
efficiency in generating S-boxes with optimal cryptographic
properties, remains an area ripe for exploration.</p>
      <p>Our study aims to address this gap by presenting a
comprehensive investigation into the application of genetic
algorithms for generating 8×8 S-boxes with a nonlinearity of
104. We explore the synergy between genetic algorithms and
the WHS cost function, aiming to match or surpass the
efficiency of existing methods while leveraging the inherent
advantages of evolutionary approaches, such as adaptability
and the potential for parallelization.</p>
      <p>The remainder of this paper is structured as follows:
Section 2 provides a comprehensive review of the literature,
detailing the evolution of S-box generation techniques and
the current state of the art. Section 3 offers a background on
S-boxes, their cryptographic properties, and the theoretical
foundations underpinning their design. Section 4 delineates
our methodology and experimental setup, including the
specifics of our genetic algorithm implementation and
evaluation criteria. Section 5 presents our results and a
detailed discussion, comparing our findings with existing
methods and analyzing their implications. Finally, Section 6
concludes the paper, summarizing our key findings and
outlining promising directions for future research in this
critical area of cryptographic system design.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>The design and generation of cryptographically strong
Sboxes have been subjects of intensive research in the field
of symmetric key cryptography. This section provides a
comprehensive review of the existing literature, focusing on
various approaches to S-box generation and their
cryptographic properties.</p>
      <p>
        Algebraic constructions of S-boxes, such as those based
on finite field inversion used in the Advanced Encryption
Standard (AES) [
        <xref ref-type="bibr" rid="ref15 ref30 ref31">15, 30, 31</xref>
        ], have been widely studied.
However, as Bard (2009) [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] and Courtois and Bard (2007)
[
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] point out, these constructions may be vulnerable to
algebraic attacks due to their inherent mathematical
structure. This vulnerability has led to increased interest in
generating S-boxes with more complex algebraic structures
[
        <xref ref-type="bibr" rid="ref32">32</xref>
        ].
      </p>
      <p>
        Heuristic approaches have gained significant traction in
recent years. Clark et al. (2005) [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] introduced a simulated
annealing approach for S-box generation [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ],
demonstrating its effectiveness in producing S-boxes with
high nonlinearity. Building on this work, Souravlias et al.
(2017) [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] proposed an algorithm portfolio approach
combining simulated annealing and tabu search, showing
improved results under limited time budgets.
      </p>
      <p>
        Genetic algorithms have also been explored for S-box
generation [
        <xref ref-type="bibr" rid="ref24 ref34">24, 34</xref>
        ]. Tesar (2010) [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ] combined a genetic
algorithm with a tree search method, generating 8×8
Sboxes with nonlinearity up to 104. Picek et al. (2016) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]
presented a novel cost function for evolving S-boxes,
achieving significant improvements in both speed and
quality of results compared to previous approaches.
      </p>
      <p>
        Ivanov et al. (2016a, 2016b) [
        <xref ref-type="bibr" rid="ref36 ref37">36, 37</xref>
        ] introduced an
innovative approach using a modified immune algorithm
combined with hill climbing, rapidly generating large sets
of highly nonlinear bijective S-boxes. Their work
demonstrated the potential of hybrid approaches in S-box
generation.
      </p>
      <p>
        Recent advancements have focused on improving
specific cryptographic properties. Rodinko et al. (2017) [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ]
optimized a method for generating high nonlinear S-boxes,
achieving nonlinearity of 104, algebraic immunity of 3, and
8-uniformity within reasonable computational time. Freyre
Echevarría and Martínez Díaz (2020) [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] proposed a new
cost function specifically designed to improve the
nonlinearity of bijective S-boxes.
      </p>
      <p>
        The importance of multiple cryptographic criteria has
been emphasized in recent literature. Freyre-Echevarría et
al. (2020) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] introduced an external
parameterindependent cost function for evolving bijective S-boxes,
considering both nonlinearity and other important
properties. Their work highlighted the need for balanced
optimization across multiple cryptographic criteria.
      </p>
      <p>
        More recent studies have explored novel approaches to
S-box generation. Artuğer and Özkaynak (2024) [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ]
proposed a post-processing approach to improve the
nonlinearity of chaos-based S-boxes, addressing a
longstanding challenge in this area. Haider et al. (2024) [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ]
introduced an S-box generator based on elliptic curves,
offering a balance between randomization and optimization
with minimal computation time.
      </p>
      <p>
        The application of S-boxes in specific cryptographic
contexts has also been a focus of recent research. Jamal et
al. (2024) [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ] developed a region of interest-based medical
image encryption technique using chaotic S-boxes,
demonstrating the practical applications of advanced S-box
designs in specialized domains.
      </p>
      <p>
        Emerging threats and the need for enhanced security
have led to new considerations in S-box design. Fahd et al.
(2024) [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ] examined the reality of backdoored S-boxes,
highlighting the importance of thorough cryptanalysis and
the potential vulnerabilities in S-box structures.
      </p>
      <p>In conclusion, the literature reveals a trend towards more
sophisticated, multi-criteria optimization approaches in S-box
generation. While significant progress has been made in
achieving high nonlinearity and other desirable properties,
there remains a need for methods that can consistently produce
S-boxes with optimal cryptographic characteristics while
balancing computational efficiency and resistance to emerging
cryptanalytic techniques.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Background</title>
      <p>
        Symmetric cryptography forms the backbone of secure
communication in the digital age. At the heart of many
symmetric ciphers lie Substitution boxes (S-boxes),
nonlinear components crucial for ensuring the security and
robustness of these cryptographic systems. This section
provides a comprehensive overview of S-boxes, their role in
symmetric cryptography, and the application of genetic
algorithms in their optimization.
3.1. S-boxes in symmetric cryptography
Substitution boxes (S-boxes) are fundamental components
in symmetric-key algorithms, serving as the primary source
of nonlinearity [7, 8]. An S-box is essentially a vectorial
Boolean function that maps a fixed number of input bits to
a fixed number of output bits. Formally, an n×m S-box can
be defined as [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]:
      </p>
      <p>S : F2n  F2m ,
where  and  are vector spaces over the Galois field
GF(2) with dimensions n and m, respectively.</p>
      <p>
        The cryptographic strength of an S-box is determined
by several critical properties [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]:
      </p>
      <p>1) Nonlinearity: A measure of the distance between the
S-box and the set of all affine functions. For an n×n S-box,
the nonlinearity is defined as:</p>
      <p>1
NL(S )  2n1 </p>
      <p>max
2 aF2n ,bF2n \0 xF2n
 (1)bS ( x)ax
,
where denotes the dot product and ⊕ represents bitwise
XOR.</p>
      <p>2) Differential uniformity: Quantifies the uniformity of
output differences when the input is changed. The
differential uniformity δ is given by:</p>
      <p>n
  max | x  F2 : S ( x)  S ( x  a)  b |
a0,b
.</p>
      <p>3) Algebraic degree: The highest degree among the
component Boolean functions of S. For an n×m S-box, the
algebraic degree is:
deg(S )  max deg(v  S )
vF2m \0
.</p>
      <p>4) Balancedness: An S-box is balanced if each output
occurs with equal probability when the input is uniformly
distributed.</p>
      <p>
        5) Algebraic Immunity [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ]: A measure of resistance
against algebraic attacks. For an S-box  :  →  , the
algebraic immunity is defined as:
      </p>
      <p>AI (S )  min deg(P), P  I (S ) ,
where I(S) is the ideal generated by the polynomials
representing the S-box:
 y1  f1 (x1, x2 ,..., xn ), 
 
I (S )   y2  f2 (x1, x2 ,..., xn ), 
 ..., 
 
 ym  fm (x1, x2 ,..., xn )  .</p>
      <p>The algebraic immunity can be computed by constructing
the minimal reduced Gröbner basis of the ideal I(S) using the
degree reverse lexicographic (degrevlex) ordering, and
finding the polynomial of minimum degree in this basis.</p>
      <p>These properties collectively contribute to the S-box’s
ability to resist various cryptanalytic attacks, including
differential, linear, and algebraic cryptanalysis. The concept
of algebraic immunity for S-boxes, as introduced by Faugère
and Perret, provides a crucial measure of resistance against
algebraic attacks, which attempt to express the cipher as a
system of low-degree multivariate polynomial equations.</p>
      <p>
        The relationship between the algebraic immunity of an
S-box and that of Boolean functions can be established
through the following construction. Consider a Boolean
function  :  →  defined as [
        <xref ref-type="bibr" rid="ref44 ref45">44, 45</xref>
        ]:
fS ( x1 , x2 ,..., xn , y1, y2 ,..., ym ) 
      </p>
      <p>1, if i, j : fi ( x1, x2 ,..., xn )  y j ;
 </p>
      <p>0, if i, j : fi ( x1, x2 ,..., xn )  y j .</p>
      <p>The algebraic immunity of the S-box S is then equivalent
to the minimum degree of non-zero polynomials in the
annihilator of fS:</p>
      <p>AI (S)  min deg(g) | g  Ann( fS ) .</p>
      <p>
        This formulation provides a bridge between the
algebraic immunity of vectorial Boolean functions (S-boxes)
and that of single Boolean functions, unifying the concept
across different cryptographic primitives.
3.2. Importance of S-boxes in modern
ciphers and the need for
randomness
S-boxes play a pivotal role in ensuring the security of
symmetric ciphers by introducing nonlinearity and
complexity into the encryption process [7]. They are
employed in widely-used algorithms such as the Advanced
Encryption Standard (AES) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], where the SubBytes
operation relies on a carefully designed 8×8 S-box.
However, the increasing sophistication of cryptanalytic
techniques has necessitated a reevaluation of traditional
Sbox design methods.
      </p>
      <p>
        While algebraically constructed S-boxes, such as those
used in AES (based on finite field inverses) [
        <xref ref-type="bibr" rid="ref30 ref31">30, 31</xref>
        ], offer
certain advantages in terms of implementation efficiency
and some cryptographic properties, they may fall short in
terms of algebraic immunity [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ]. The structured nature of
these S-boxes can potentially lead to vulnerabilities against
algebraic attacks, which have gained significant attention in
recent years [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ].
      </p>
      <p>
        Algebraic attacks exploit the possibility of expressing
the cipher as a system of low-degree multivariate
polynomial equations [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ]. The complexity of solving
such systems is closely related to the algebraic immunity of
the S-box [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ]. A low algebraic immunity allows for a
simpler representation of the cipher, potentially reducing
the computational effort required for cryptanalysis [
        <xref ref-type="bibr" rid="ref44 ref45">44, 45</xref>
        ].
This vulnerability has prompted researchers to explore
alternative methods for S-box generation that prioritize
high algebraic immunity alongside other critical properties.
To address these concerns, there is growing interest in the
cryptographic community in random or pseudo-random
Sboxes [
        <xref ref-type="bibr" rid="ref24 ref46 ref47">24, 46, 47</xref>
        ]. These S-boxes, generated through
heuristic methods, offer several advantages:
      </p>
      <p>Higher algebraic immunity: Random S-boxes are
less likely to exhibit algebraic structures that can
be exploited in attacks, potentially leading to
higher algebraic immunity values.</p>
      <p>Resistance to specialized attacks: Algebraically
constructed S-boxes might be vulnerable to attacks
tailored to their specific structure. Random
Sboxes, lacking such predictable structures, can
offer better protection against these targeted
attacks.</p>
      <p>Flexibility in design: Heuristic methods allow for
the optimization of multiple cryptographic criteria
simultaneously, enabling a more balanced
approach to S-box design.</p>
      <p>Adaptability to evolving threat models: As new
cryptanalytic techniques emerge, the criteria for S-box
generation can be adjusted more easily with heuristic
methods compared to algebraic constructions.</p>
      <p>
        Various heuristic approaches have been proposed for
generating high-quality random S-boxes, including:













Simulated Annealing [
        <xref ref-type="bibr" rid="ref23 ref26 ref33 ref48">23, 26, 33, 48</xref>
        ]: This method
mimics the physical process of annealing in
metallurgy, gradually “cooling” the system to find
an optimal configuration. It has shown promise in
generating S-boxes with good cryptographic
properties.
      </p>
      <p>
        Hill Climbing [
        <xref ref-type="bibr" rid="ref10 ref36 ref49 ref50">6, 10, 36, 49, 50</xref>
        ]: A local search
algorithm that iteratively makes small
improvements to a candidate solution. This
approach can be effective in fine-tuning S-box
properties.
      </p>
      <p>
        Genetic Algorithms [
        <xref ref-type="bibr" rid="ref10 ref35 ref37 ref51">10, 35, 37, 51</xref>
        ]: Evolutionary
approaches that mimic natural selection to evolve
a population of S-boxes towards desired
properties. These algorithms have demonstrated
the ability to generate S-boxes with excellent
cryptographic characteristics, including high
algebraic immunity.
      </p>
      <p>
        In this work, we focus on genetic algorithms due to their
ability to efficiently explore large search spaces and handle
multi-objective optimization problems. Genetic algorithms
offer a promising approach to generating S-boxes that
balance multiple cryptographic criteria, including high
algebraic immunity, nonlinearity, and differential
uniformity.
3.3. Genetic algorithms for S-box generation
Genetic Algorithms (GAs) are stochastic optimization
techniques inspired by the principles of natural selection
and evolution [
        <xref ref-type="bibr" rid="ref52 ref53">52, 53</xref>
        ]. They operate on a population of
potential solutions, evolving them over successive
generations to improve their fitness concerning a defined
objective function. In the context of S-box generation, GAs
offer a powerful and flexible approach to optimizing
multiple cryptographic properties simultaneously
[
        <xref ref-type="bibr" rid="ref10 ref37 ref54">10, 37, 54</xref>
        ].
      </p>
      <p>
        The fundamental principle of GAs is to emulate the
process of natural selection, where the fittest individuals are
more likely to survive and reproduce, passing their
beneficial traits to future generations [
        <xref ref-type="bibr" rid="ref52 ref53">52, 53</xref>
        ]. In the case of
S-box generation, an “individual” represents a candidate
Sbox, and its “fitness” is determined by how well it satisfies
the desired cryptographic properties.
      </p>
      <p>
        The basic structure of a GA includes the following
components [
        <xref ref-type="bibr" rid="ref54 ref55">54, 55</xref>
        ]:
      </p>
      <p>Chromosome representation: Encoding of
potential solutions (S-boxes).</p>
      <p>Fitness function: Evaluates the quality of solutions
based on cryptographic criteria.</p>
      <p>Selection mechanism: Chooses individuals for
reproduction.</p>
      <p>Genetic operators: Crossover and mutation to
create new solutions.</p>
      <p>Termination criteria: Conditions for ending the
evolutionary process.</p>
      <p>A general pseudocode for a Genetic Algorithm applied
to S-box generation can be described as follows:
Algorithm: Genetic algorithm for S-box generation
Input: Population size N, number of generations G,
crossover rate pc, mutation rate pm;</p>
      <p>Output: Optimized S-box;
1. Initialize population P of N random S-boxes
2. For g = 1 to G do
3. Evaluate the fitness of each S-box in P
4. Select parents for reproduction using tournament
selection
5. Create new population P’ through crossover and
mutation:
6. For i = 1 to N/2 do
7. Select two parents p1 and p2 from P
8. If random (0,1) &lt; pc then
9. (c1, c2) = Crossover(p1, p2)
10. Else
11. (c1, c2) = (p1, p2)
12. End If
13. Mutate c1 and c2 with probability pm
14. Add c1 and c2 to P’
15. End For
16. P = P’
17. End For
18. Return the best S-box from P</p>
      <sec id="sec-3-1">
        <title>Key parameters and their roles:</title>
        <p>Population size (N): Determines the diversity of
solutions. A larger population allows for broader
exploration of the search space but increases
computational cost.</p>
        <p>Number of generations (G): Controls the duration
of the evolutionary process. More generations</p>
        <p>The fitness function is crucial in guiding the
evolutionary process towards S-boxes with desired
cryptographic properties.</p>
        <p>The selection mechanism, often implemented as
tournament selection, ensures that fitter individuals have a
higher chance of being chosen for reproduction. This
process mimics natural selection, where more adapted
individuals are more likely to pass on their genes.</p>
        <p>Crossover operators for S-boxes must be carefully
designed to preserve the bijective property. One approach
is to use a permutation-based crossover, where segments of
the S-box permutation are exchanged between parents. For
example, given two parent S-boxes P1 and P2, a two-point
crossover might produce offspring C1 and C2 as follows:
P1  (a1, a2 ,..., ak | ak 1,..., al | al1, ..., an ) ;
P2  (b1, b2 ,..., bk | bk 1, ..., bl | bl 1,..., bn ) ;
C1  (a1, a2 ,..., ak | bk 1,..., bl | al1, ..., an ) ;
C2  (b1, b2 ,..., bk | ak 1,..., al | bl 1,..., bn ) .</p>
        <p>Mutation operators introduce small random changes to
maintain genetic diversity and prevent premature
convergence. For S-boxes, this might involve swapping two
randomly chosen elements or applying a random
permutation to a subset of elements.
4. Modified genetic algorithm
Our research focuses on developing and implementing a
modified genetic algorithm for generating
cryptographically strong S-boxes. This section details our
approach, the algorithm’s structure, and the experimental
setup used to evaluate its performance.
4.1. Modified genetic algorithm overview
We have developed a modified genetic algorithm that
incorporates elements of hill climbing, enhancing its ability
to navigate the complex search space of S-box
configurations. This approach allows for a more targeted
exploration of promising regions while maintaining the
population-based nature of genetic algorithms.</p>
        <p>The core idea of our algorithm is to maintain a
population of S-boxes, subject them to controlled mutations,
evaluate their cryptographic properties, and selectively
propagate the best specimens to subsequent generations.
This process is iterated until either an S-box meeting the
desired criteria is found or a predefined computational limit
is reached. The pseudocode for our modified genetic
algorithm is:</p>
      </sec>
      <sec id="sec-3-2">
        <title>Algorithm:</title>
        <p>generation</p>
        <p>Input: Spop, Kiter, Kpop, Kmut
Output: Optimized S-box or 0 (failure)</p>
        <p>Modified genetic algorithm</p>
        <p>Key components and parameters of the algorithm:



</p>
        <p>Spop: The population of S-boxes, initially generated
using the Fisher-Yates shuffle algorithm to ensure
bijectivity.</p>
        <p>Kiter: Maximum number of iterations, set to 150,000
in our experiments.</p>
        <p>Kpop: Population size, representing the number of
elite S-boxes maintained in each generation.</p>
        <p>Kmut: Number of mutations applied to each S-box
in the population per generation.</p>
        <p>The elite selection function performs a crucial role in
our algorithm. It ranks the S-boxes based on their
nonlinearity and objective function values, prioritizing
higher nonlinearity and lower objective function values.
This function ensures that only the top Kpop S-boxes survive
to the next generation, maintaining a high-quality
population.</p>
        <sec id="sec-3-2-1">
          <title>4.2. Mutation operator</title>
          <p>Our mutation operator is designed to preserve the
bijectivity of the S-box while introducing controlled
randomness. It operates by swapping two randomly
selected (distinct) elements within the S-box. This approach
ensures that the fundamental property of bijectivity is
maintained throughout the evolutionary process.</p>
          <p>Formally, the mutation can be described as:</p>
          <p>S [i]  S [ j ], S [ j]  S[i] ,
where  ,  ∈ 0,1, … , 255,  ≠  and all other elements
remain unchanged.</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>4.3. Objective function</title>
          <p>
            The choice of objective function is critical in guiding the
evolutionary process towards cryptographically strong
Sboxes. We employ the WHS function proposed by Clark et
al. [
            <xref ref-type="bibr" rid="ref26">26</xref>
            ], which has shown effectiveness in generating
highquality S-boxes. The WHS function is defined as [
            <xref ref-type="bibr" rid="ref26">26</xref>
            ]:
255 255
WHS    | WHT [b, i] |  X
          </p>
          <p>R
b1 i0 ,
where WHT[b,i] represents the Walsh-Hadamard
transform coefficients; i iterate over all component
functions and their linear combinations; b iterates over all
linear functions; X and R are real-valued parameters.</p>
          <p>
            Based on empirical studies, we set R = 12 and X = 0,
which has been shown to yield optimal results in generating
bijective S-boxes with high nonlinearity [
            <xref ref-type="bibr" rid="ref56 ref57">56, 57</xref>
            ].
          </p>
        </sec>
        <sec id="sec-3-2-3">
          <title>4.4. Evaluation criteria</title>
          <p>The primary criteria for evaluating the generated S-boxes
are:</p>
          <p>Nonlinearity (NL): We aim for a nonlinearity of at
least 104, which is close to the theoretical
maximum for 8×8 S-boxes.</p>
          <p>Differential uniformity (δ): Lower values indicate
better resistance against differential cryptanalysis.
Algebraic degree (deg): Higher degrees provide
better resistance against algebraic attacks.</p>
          <p>Algebraic immunity (AI): Higher values indicate
increased resistance to algebraic cryptanalysis.</p>
          <p>The evaluate function in our algorithm computes these
properties for each generated S-box, allowing us to assess
its cryptographic strength comprehensively.</p>
        </sec>
        <sec id="sec-3-2-4">
          <title>4.5. Experimental setup</title>
          <p>Our experiments were conducted on a high-performance
computing cluster to handle the computational intensity of
the S-box generation process. The implementation was done
in C++ for efficiency, with parallelization to utilize multiple
cores.</p>
          <p>Given that the calculation of the objective function is
the most computationally expensive operation in terms of
processor time, the complexity of the entire search
algorithm can be considered proportional to the number of
times the objective function is calculated. This corresponds
to the number of S-boxes that were generated and
evaluated. We denote this quantity as KSbox.</p>
          <p>To accelerate the algorithm’s performance, we
implemented parallel computation of the new population
using Nthread = 8 threads within each iteration. This
parallelization significantly reduced the overall execution
time of the algorithm.</p>
          <p>We conducted a comprehensive parameter sweep to
analyze the impact of population size and mutation rate on
the quality of the generated S-boxes and the algorithm's
convergence rate. Specifically:</p>
          <p>Population size (Kpop) was varied from 1 to 21 with
a step size of 2.</p>
          <p>The mutation rate (Kmut) was varied from 1 to 31
with a step size of 3.





</p>
          <p>For each combination of Kpop and Kmut, we performed 100
independent runs of the search algorithm to ensure
statistical significance. This resulted in a total of
11×11×100 = 12,100 experimental runs.</p>
          <p>The algorithm was set to terminate upon finding an
Sbox with nonlinearity ≥ 104 or reaching the maximum
iteration limit of 150,000. For each run, we recorded the
number of S-boxes generated and evaluated (KSbox), which
serves as our primary metric for computational efficiency.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Results and discussion</title>
      <p>This section presents the results of our comprehensive
experimental study on the modified genetic algorithm for
Sbox generation. We analyze the performance of the
algorithm across various parameter configurations and
discuss the implications of our findings.
5.1. Overview of experimental results
Our primary metric for evaluating the algorithm’s
efficiency is KSbox, which represents the number of S-boxes
generated and evaluated before finding an S-box with the
desired nonlinearity of 104. Table 1 presents the average
KSbox values for different combinations of population size
(Kpop) and mutation rate (Kmut).
5.2. Analysis of population size impact
One of the most striking observations from our results is the
superior performance of the algorithm when Kpop = 1. This
configuration consistently yielded the lowest KSbox values
across all mutation rates, with averages ranging from 49,277 to
58,213. This finding is somewhat counterintuitive, as genetic
algorithms typically benefit from larger population sizes that
provide greater genetic diversity.</p>
      <p>The effectiveness of a single-individual population
suggests that our algorithm’s behavior in this configuration
closely resembles that of a stochastic hill-climbing method. This
approach appears to be particularly well-suited to the S-box
optimization problem, possibly due to the following factors:</p>
      <p>Landscape structure: The fitness landscape of S-box
configurations may have numerous local optima that are
relatively close in quality to the global optimum. In such a
scenario, an aggressive local search can be highly effective.</p>
      <p>Mutation operator efficiency: Our swap-based
mutation operator appears to be sufficiently powerful to
navigate the search space effectively, even without the
diversity typically provided by a larger population.</p>
      <p>Reduced computational overhead: With Kpop = 1, the
algorithm avoids the computational cost associated with
managing and evaluating a large population, allowing for
more iterations within the same computational budget.</p>
      <sec id="sec-4-1">
        <title>5.3. Impact of mutation rate</title>
        <p>While the population size shows a clear trend, the impact of
the mutation rate (Kmut) is more nuanced. For Kpop = 1, we
observe that:</p>
        <p>The lowest KSbox (49,277) was achieved with Kmut = 7.
Performance generally degraded with higher mutation
rates, with KSbox increasing to 58,213 at Kmut = 1.</p>
        <p>This pattern suggests that there exists an optimal
balance between exploration and exploitation in the search
process. Lower mutation rates may lead to premature
convergence, while higher rates may disrupt good solutions
too frequently.
5.4. Scalability and computational</p>
        <p>efficiency
As Kpop increases, we observe a general trend of increasing
KSbox values, indicating reduced computational efficiency.
This scaling behavior can be attributed to:
</p>
        <p>Increased evaluation overhead: Larger populations
require more objective function evaluations per
generation.
</p>
        <p>Slower convergence: Diversity maintenance in
larger populations may slow down the
convergence to high-quality solutions.</p>
        <p>However, it’s worth noting that larger populations
might offer benefits not captured by the KSbox metric alone,
such as increased robustness or the ability to find a more
diverse set of high-quality S-boxes.</p>
      </sec>
      <sec id="sec-4-2">
        <title>5.5. Parallelization performance</title>
        <p>Our implementation of parallel computation using 8 threads
(Nthread = 8) has proven to be effective in accelerating the
search process. This parallelization strategy is particularly
beneficial for configurations with larger Kpop and Kmut
values, where the workload can be more evenly distributed
across threads.
5.6. Comparison with existing methods
The best-performing configuration of our algorithm
(Kpop = 1, Kmut = 7) achieves an average KSbox of 49,277. To
contextualize our findings within the broader landscape of
S-box generation research, we conducted a comprehensive
comparison of our genetic algorithm approach with existing
methods. Table 2 presents this comparative analysis,
encompassing various techniques and cost functions
employed in the field.</p>
        <p>
          Our genetic algorithm implementation, utilizing the WHS
cost function, achieves results that are on par with the
bestknown methods in the field. Specifically, our approach
generates S-boxes with a nonlinearity of 104 in an average of
49,399 iterations, with a 100% success rate. This performance
is comparable to our previous works using hill climbing
[
          <xref ref-type="bibr" rid="ref28">6, 28</xref>
          ], which required 50,000 iterations on average.
        </p>
        <p>Several key observations emerge from this comparative
analysis:

</p>
        <p>Parity in Performance: Our genetic algorithm
achieves results that are statistically equivalent to
the best-known methods, particularly our earlier
hill-climbing approach. This parity is significant,
as it demonstrates the versatility and potential of
genetic algorithms in this domain.</p>
        <p>Algorithmic Diversity: By achieving comparable
results through a different algorithmic approach,
we have expanded the toolkit available to
11
13
112,718
122,364
122,382
129,411
124,466
125,274
129,718
131,029
135,294
133,665
143,233
15</p>
      </sec>
      <sec id="sec-4-3">
        <title>5.7. Practical Implications</title>
        <p>The superior performance of the Kpop = 1 configuration has
important implications for the practical application of our
algorithm:
</p>
        <sec id="sec-4-3-1">
          <title>Resource efficiency: The algorithm effectively run on systems with can be limited</title>
          <p>computational resources, as it doesn’t require
maintaining a large population.</p>
          <p>Simplicity: The simplified population management
makes the algorithm easier to implement and tune.
Adaptability: The algorithm’s efficiency makes it
suitable for scenarios where S-boxes need to be
generated or updated frequently.
However, it’s important to note that while this
configuration is optimal for finding a single high-quality
S-box, alternative configurations may be more suitable
for generating a diverse set of S-boxes or for
multiobjective optimization scenarios.</p>
        </sec>
      </sec>
      <sec id="sec-4-4">
        <title>5.8. Limitations and future work</title>
        <p>While our results are promising, several avenues for
future research remain:



</p>
        <p>Extended cryptographic criteria: Incorporate
additional criteria such as algebraic immunity
and differential uniformity into the objective
function.</p>
        <p>Adaptive parameter tuning: Develop methods
to dynamically adjust Kpop and Kmut during the
search process.</p>
        <p>Alternative mutation operators: Explore more
sophisticated mutation strategies that leverage
domain-specific knowledge about S-box
structures.</p>
        <p>Multi-objective optimization: Extend the
algorithm to simultaneously optimize multiple
cryptographic properties, potentially using
Pareto-based approaches.</p>
        <p>In conclusion, our modified genetic algorithm
demonstrates exceptional efficiency in generating
cryptographically strong S-boxes, particularly in its
hillclimbing-like configuration. These findings contribute
valuable insights to the field of cryptographic primitive
design and offer a powerful tool for the development of
secure symmetric encryption systems.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. Conclusions</title>
      <p>This study presents a significant advancement in the
field of S-box generation for symmetric key
cryptography, focusing on the application of genetic
algorithms to produce highly nonlinear substitutions.
Our research demonstrates that genetic algorithms,
when properly optimized and combined with the
WalshHadamard Spectrum (WHS) cost function, can achieve
performance parity with the best-known methods in
generating 8×8 S-boxes with a nonlinearity of 104.</p>
      <p>Key findings of our work include:</p>
      <p>The genetic algorithm approach achieves an
average of 49,399 iterations to generate target
S-boxes, comparable to the best results of
50,000 iterations using hill-climbing methods.
A 100% success rate in producing S-boxes with
the desired nonlinearity, matching the reliability
of top-performing techniques.</p>
      <p>A significant improvement over earlier genetic
algorithm implementations, reducing iteration
counts by orders of magnitude.</p>
      <p>The achievement of performance parity using a different
algorithmic approach expands the toolkit available to
cryptographers and highlights the versatility of genetic
methods in cryptographic primitive generation. This
diversity in high-performing techniques enhances the
robustness of S-box generation methodologies.</p>
      <p>Furthermore, our results underscore the potential of
genetic algorithms in this domain, particularly their
adaptability to evolving cryptographic criteria and their
inherent parallelization capabilities. These
characteristics position genetic approaches as promising
avenues for future research, potentially leading to more
efficient, flexible, and innovative S-box generation
techniques.</p>
      <p>In conclusion, while not surpassing existing
methods in raw performance, our genetic algorithm
approach offers a valuable alternative that matches the
best-known results. This equivalence, coupled with the
unique advantages of genetic algorithms, opens new
perspectives in cryptographic research and
development. Future work should focus on exploiting
these advantages, potentially through hybridization
with other heuristic methods or by leveraging parallel
computing architectures to further enhance S-box
generation efficiency.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          , et al.,
          <article-title>HDLBC: A Lightweight Block Cipher with High Diffusion</article-title>
          , Integr.
          <volume>94</volume>
          (
          <year>2024</year>
          )
          <article-title>102090</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.vlsi.
          <year>2023</year>
          .
          <volume>102090</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Tiwari</surname>
          </string-name>
          , Chapter 14-Cryptography in Blockchain, Distributed Computing to Blockchain, Academic Press (
          <year>2023</year>
          )
          <fpage>251</fpage>
          -
          <lpage>265</lpage>
          . doi:
          <volume>10</volume>
          .1016/B978- 0
          <source>-323-96146-2</source>
          .
          <fpage>00011</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Milanič</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Servatius</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Servatius</surname>
          </string-name>
          , Chapter 8 - Codes and cyphers,
          <source>Discrete Mathematics With Logic</source>
          , Academic Press (
          <year>2024</year>
          )
          <fpage>163</fpage>
          -
          <lpage>179</lpage>
          . doi:
          <volume>10</volume>
          .1016/B978-0
          <source>-44-318782-7</source>
          .
          <fpage>00013</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sovyn</surname>
          </string-name>
          , et al.,
          <article-title>Minimization of Bitsliced Representation of 4×4 S-Boxes based on Ternary Logic Instruction</article-title>
          ,
          <source>in Cybersecurity Providing in Information and Telecom-munication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>12</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Changle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. P.</given-names>
            <surname>Metkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Patole</surname>
          </string-name>
          ,
          <article-title>Implementation of S-box for Lightweight Block Cipher</article-title>
          ,
          <source>3rd International Conference on Intelligent Technologies</source>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/CONIT59222.
          <year>2023</year>
          .
          <volume>10205535</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>A New Cost Function for Heuristic Search of Nonlinear Substitutions, Expert Syst</article-title>
          . Appls.
          <volume>237</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2023</year>
          .
          <volume>121684</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Menezes</surname>
          </string-name>
          , et al., CRC Press (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1201/9780429466335.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>C. E.</given-names>
            <surname>Shannon</surname>
          </string-name>
          ,
          <source>Communication Theory of Secrecy Systems, Bell Syst. Tech. J</source>
          .
          <volume>28</volume>
          (
          <year>1949</year>
          )
          <fpage>656</fpage>
          -
          <lpage>715</lpage>
          . doi:
          <volume>10</volume>
          .1002/j.1538-
          <fpage>7305</fpage>
          .
          <year>1949</year>
          .tb00928.x.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Carlet</surname>
          </string-name>
          ,
          <article-title>Vectorial Boolean Functions for Cryptography, Boolean Models and</article-title>
          Methods in Mathematics, Computer Science, and
          <string-name>
            <surname>Engineering</surname>
          </string-name>
          (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Freyre-Echevarría</surname>
          </string-name>
          , et al.,
          <source>An External Parameter Independent Novel Cost Function for Evolving Bijective Substitution-Boxes, Symmetry</source>
          <volume>12</volume>
          (
          <year>2020</year>
          )
          <year>1896</year>
          . doi:
          <volume>10</volume>
          .3390/sym12111896.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Picek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cupic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rotim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A New</given-names>
            <surname>Cost</surname>
          </string-name>
          <article-title>Function for Evolution of S-Boxes</article-title>
          ,
          <source>Evolut. Computation</source>
          <volume>24</volume>
          (
          <year>2016</year>
          )
          <fpage>695</fpage>
          -
          <lpage>718</lpage>
          . doi:
          <volume>10</volume>
          .1162/EVCO_a_
          <fpage>00191</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Álvarez-Cubero</surname>
          </string-name>
          ,
          <article-title>Vector Boolean Functions: Applications in Symmetric Cryptography (</article-title>
          <year>2015</year>
          ).
          <source>doi: 10.13140/RG. 2.2.12540.23685.</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Lisitskiy</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Lisitska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <article-title>Cryptographically Properties of Random S-Boxes</article-title>
          ., 16th International Conference on ICT in Education, Research and
          <string-name>
            <given-names>Industrial</given-names>
            <surname>Applications</surname>
          </string-name>
          . Integration, Harmonization and
          <string-name>
            <surname>Knowledge Transfer II</surname>
          </string-name>
          , vol.
          <volume>2732</volume>
          (
          <year>2020</year>
          )
          <fpage>228</fpage>
          -
          <lpage>241</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>I.</given-names>
            <surname>Gorbenko</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Random</surname>
            <given-names>S-</given-names>
          </string-name>
          <article-title>Boxes Generation Methods for Symmetric Cryptography</article-title>
          ,
          <source>IEEE 2nd Ukraine Conference on Electrical and Computer</source>
          Engineering (UKRCON) (
          <year>2019</year>
          )
          <fpage>947</fpage>
          -
          <lpage>950</lpage>
          . doi:
          <volume>10</volume>
          .1109/UKRCON.
          <year>2019</year>
          .
          <volume>8879962</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.</given-names>
            <surname>Daemen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rijmen</surname>
          </string-name>
          ,
          <article-title>Specification of Rijndael, The Design of Rijndael: The Advanced Encryption Standard (AES</article-title>
          ), Springer (
          <year>2020</year>
          )
          <fpage>31</fpage>
          -
          <lpage>51</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -60769-
          <issue>5</issue>
          _
          <fpage>3</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Bard</surname>
          </string-name>
          , Algebraic Cryptanalysis, Springer US (
          <year>2009</year>
          ). doi:
          <volume>10</volume>
          .1007/978-0-
          <fpage>387</fpage>
          -88757-9.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>N. T.</given-names>
            <surname>Courtois</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Bard</surname>
          </string-name>
          ,
          <article-title>Algebraic Cryptanalysis of the Data Encryption Standard, Cryptography and Coding</article-title>
          , LNSC
          <volume>4887</volume>
          (
          <year>2007</year>
          )
          <fpage>152</fpage>
          -
          <lpage>169</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -77272-9_
          <fpage>10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>N. T.</given-names>
            <surname>Courtois</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pieprzyk</surname>
          </string-name>
          ,
          <source>Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, Advances in Cryptology-ASIACRYPT</source>
          <year>2002</year>
          , LNCS
          <volume>2501</volume>
          (
          <year>2002</year>
          )
          <fpage>267</fpage>
          -
          <lpage>287</lpage>
          . doi:
          <volume>10</volume>
          .1007/3-540- 36178-2_
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buhas</surname>
          </string-name>
          , et al.,
          <article-title>Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3188</volume>
          , no.
          <issue>2</issue>
          (
          <year>2021</year>
          )
          <fpage>273</fpage>
          -
          <lpage>281</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          , et al.,
          <article-title>Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>2746</volume>
          (
          <year>2020</year>
          )
          <fpage>23</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          ,
          <article-title>Stability Verification of Self-Organized Wireless Networks with Block Encryption</article-title>
          ,
          <source>in: 5th International Workshop on Computer Modeling and Intelligent Systems</source>
          , vol.
          <volume>3137</volume>
          (
          <year>2022</year>
          )
          <fpage>227</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Freyre</surname>
          </string-name>
          <string-name>
            <surname>Echevarría</surname>
          </string-name>
          ,
          <article-title>Evolución Híbrida de S-cajas no Lineales Resistentes a Ataques de Potencia (</article-title>
          <year>2020</year>
          ).
          <source>doi: 10.13140/RG.2.2.17037.77284/1.</source>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>J. McLaughlin</surname>
          </string-name>
          ,
          <article-title>Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components</article-title>
          ,
          <source>PhD</source>
          , University of York (
          <year>2012</year>
          ). URL: https://etheses.whiterose.ac.uk/3674/
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>L. D.</given-names>
            <surname>Burnett</surname>
          </string-name>
          ,
          <article-title>Heuristic Optimization of Boolean Functions and Substitution Boxes for Cryptography, PhD</article-title>
          , Queensland University of Technology, (
          <year>2005</year>
          ). URL: https://eprints.qut.edu.au/16023/
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>SBGen: A High-performance Library for Rapid Generation of Cryptographic Sboxes</article-title>
          , SoftwareX
          <volume>27</volume>
          (
          <year>2024</year>
          )
          <article-title>101788</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.softx.
          <year>2024</year>
          .
          <volume>101788</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Clark</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Jacob</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Stepney</surname>
          </string-name>
          ,
          <article-title>The Design of Sboxes by Simulated Annealing, New Gener</article-title>
          . Comput.
          <volume>23</volume>
          (
          <year>2005</year>
          )
          <fpage>219</fpage>
          -
          <lpage>231</lpage>
          . doi:
          <volume>10</volume>
          .1007/BF03037 656.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>A.</given-names>
            <surname>Freyre Echevarría</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. Martínez</given-names>
            <surname>Díaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A New</given-names>
            <surname>Cost</surname>
          </string-name>
          <article-title>Function to Improve Nonlinearity of Bijective Sboxes (</article-title>
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography</article-title>
          ,
          <source>Cryptography</source>
          <volume>8</volume>
          (
          <year>2024</year>
          )
          <article-title>17</article-title>
          . doi:
          <volume>10</volume>
          .3390/cryptography8020017.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <source>Enhancing Cryptographic Primitives through Dynamic Cost Function Optimization in Heuristic Search, Electronics</source>
          <volume>13</volume>
          (
          <year>2024</year>
          )
          <year>1825</year>
          . doi:
          <volume>10</volume>
          .3390/electronics13101825.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>K.</given-names>
            <surname>Nyberg</surname>
          </string-name>
          ,
          <article-title>Perfect Nonlinear S-boxes</article-title>
          ,
          <source>Advances in Cryptology - EUROCRYPT '91, LNCS</source>
          <volume>547</volume>
          (
          <year>1991</year>
          )
          <fpage>378</fpage>
          -
          <lpage>386</lpage>
          . doi:
          <volume>10</volume>
          .1007/3-540-46416-6_
          <fpage>32</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>K.</given-names>
            <surname>Nyberg</surname>
          </string-name>
          ,
          <article-title>Differentially uniform mappings for cryptography</article-title>
          ,
          <source>Advances in CryptologyEUROCRYPT '93, LNCS</source>
          <volume>765</volume>
          (
          <year>1994</year>
          )
          <fpage>55</fpage>
          -
          <lpage>64</lpage>
          . doi:
          <volume>10</volume>
          .1007/3-540-48285-
          <issue>7</issue>
          _
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>R.</given-names>
            <surname>La Scala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Tiwari</surname>
          </string-name>
          , Stream/Block Ciphers, Difference Equations and
          <string-name>
            <given-names>Algebraic</given-names>
            <surname>Attacks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Symbolic</given-names>
            <surname>Comput</surname>
          </string-name>
          .
          <volume>109</volume>
          (
          <year>2022</year>
          )
          <fpage>177</fpage>
          -
          <lpage>198</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jsc.
          <year>2021</year>
          .
          <volume>09</volume>
          .001.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>D.</given-names>
            <surname>Souravlias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Parsopoulos</surname>
          </string-name>
          , G. Meletiou,
          <article-title>Designing Bijective S-boxes Using Algorithm Portfolios with Limited Time Budgets</article-title>
          ,
          <source>Appl. Soft Comput</source>
          .
          <volume>59</volume>
          (
          <year>2017</year>
          )
          <fpage>475</fpage>
          -
          <lpage>486</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.asoc.
          <year>2017</year>
          .
          <volume>05</volume>
          . 052.
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>W.</given-names>
            <surname>Millan</surname>
          </string-name>
          , et al.,
          <article-title>Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes, Information and Communication Security</article-title>
          , LNCS
          <volume>1726</volume>
          (
          <year>1999</year>
          )
          <fpage>263</fpage>
          -
          <lpage>274</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -47942- 0_
          <fpage>22</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>P.</given-names>
            <surname>Tesar</surname>
          </string-name>
          ,
          <article-title>A New Method for Generating High Nonlinearity S-Boxes, (</article-title>
          <year>2010</year>
          ). URL: http://dspace.lib.vutbr.cz/xmlui/handle/11012/569 57
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>G.</given-names>
            <surname>Ivanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nikolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nikova</surname>
          </string-name>
          ,
          <article-title>Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm, Cryptography and Information Security in the Balkans</article-title>
          , LNSC
          <volume>9540</volume>
          (
          <year>2016</year>
          )
          <fpage>31</fpage>
          -
          <lpage>42</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -29172-
          <issue>7</issue>
          _
          <fpage>3</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>G.</given-names>
            <surname>Ivanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nikolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nikova</surname>
          </string-name>
          ,
          <article-title>Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties</article-title>
          , Cryptogr. Commun.
          <volume>8</volume>
          (
          <year>2016</year>
          )
          <fpage>247</fpage>
          -
          <lpage>276</lpage>
          . doi:
          <volume>10</volume>
          .1007/s12095- 015-0170-5.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rodinko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Oliynykov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gorbenko</surname>
          </string-name>
          ,
          <article-title>Optimization of the High Nonlinear S-Boxes Generation Method</article-title>
          , Tatra Mountains Math. Publ.
          <volume>70</volume>
          (
          <year>2017</year>
          )
          <fpage>93</fpage>
          -
          <lpage>105</lpage>
          . doi:
          <volume>10</volume>
          .1515/tmmp-2017-0020.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>F.</given-names>
            <surname>Artuğer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Özkaynak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A New</given-names>
            <surname>Post-Processing Approach</surname>
          </string-name>
          for Improvement of Nonlinearity Property in Substitution Boxes,
          <source>Integration</source>
          <volume>94</volume>
          (
          <year>2024</year>
          )
          <article-title>102105</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.vlsi.
          <year>2023</year>
          .
          <volume>102105</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>T.</given-names>
            <surname>Haider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Azam</surname>
          </string-name>
          , U. Hayat,
          <article-title>Substitution Box Generator with Enhanced Cryptographic Properties and Minimal Computation Time, Expert Syst</article-title>
          .
          <source>Appl</source>
          .
          <volume>241</volume>
          (
          <year>2024</year>
          )
          <article-title>122779</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2023</year>
          .
          <volume>122779</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Jamal</surname>
          </string-name>
          , et al.,
          <source>Region of Interest-Based Medical Image Encryption Technique Based on Chaotic Sboxes, Expert Syst. Appl</source>
          .
          <volume>238</volume>
          (
          <year>2024</year>
          )
          <article-title>122030</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2023</year>
          .
          <volume>122030</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>S.</given-names>
            <surname>Fahd</surname>
          </string-name>
          , et al.,
          <article-title>The Reality of Backdoored S-BoxesAn Eye Opener</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Inf</surname>
          </string-name>
          . Secur. Appls.
          <volume>80</volume>
          (
          <year>2024</year>
          )
          <article-title>103674</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.jisa.
          <year>2023</year>
          .
          <volume>103674</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>G.</given-names>
            <surname>Ars</surname>
          </string-name>
          , J.-C.
          <article-title>Faugère, Algebraic Immunities of Functions Over Finite Fields</article-title>
          ,
          <string-name>
            <surname>INRIA</surname>
          </string-name>
          , (
          <year>2005</year>
          ). URL: https://hal.inria.fr/inria-00070475
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>O. O.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>Algebraic Immunity of Non-linear Blocks of Symmetric Ciphers, Telecommun</article-title>
          .
          <source>Radio Eng</source>
          .
          <volume>77</volume>
          (
          <year>2018</year>
          )
          <fpage>309</fpage>
          -
          <lpage>325</lpage>
          . doi:
          <volume>10</volume>
          .1615/TelecomRadEng.v77.
          <year>i4</year>
          .
          <fpage>30</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>Evaluation of Algebraic Immunity of modern block ciphers</article-title>
          ,
          <source>IEEE Int. Conf. Dependable Syst</source>
          .,
          <string-name>
            <surname>Serv</surname>
          </string-name>
          . Technol. (
          <year>2018</year>
          )
          <fpage>288</fpage>
          -
          <lpage>293</lpage>
          . doi:
          <volume>10</volume>
          .1109/DESSERT.
          <year>2018</year>
          .
          <volume>8409146</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>K.</given-names>
            <surname>Lisitskiy</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Lisitska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <article-title>Cryptographically Properties of Random S-boxes</article-title>
          , in: ICT in Education, Research and
          <string-name>
            <given-names>Industrial</given-names>
            <surname>Applications</surname>
          </string-name>
          . Integration,
          <source>Harmonization and Knowledge Transfer</source>
          , vol.
          <volume>2732</volume>
          (
          <year>2020</year>
          )
          <fpage>228</fpage>
          -
          <lpage>241</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>I.</given-names>
            <surname>Gorbenko</surname>
          </string-name>
          , et al.,
          <article-title>Random S-boxes Generation Methods for Symmetric Cryptography</article-title>
          ,
          <source>IEEE 2nd Ukraine Conference on Electrical and Computer Engineering</source>
          , (
          <year>2019</year>
          )
          <fpage>947</fpage>
          -
          <lpage>950</lpage>
          . doi:
          <volume>10</volume>
          .1109/ukrcon.
          <year>2019</year>
          .
          <volume>8879962</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>Optimized Simulated Annealing for Efficient Generation of Highly Nonlinear S-boxes</article-title>
          ,
          <source>Soft. Comput</source>
          . (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1007/s00500-023-09334-y.
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Optimizing Hill Climbing Algorithm for S-Boxes</surname>
            <given-names>Generation</given-names>
          </string-name>
          ,
          <source>Electronics</source>
          <volume>12</volume>
          (
          <year>2023</year>
          )
          <article-title>2338</article-title>
          . doi:
          <volume>10</volume>
          .3390/electronics12102338.
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>A.</given-names>
            <surname>Freyre-Echevarría</surname>
          </string-name>
          , et al.,
          <article-title>Evolving Nonlinear SBoxes With Improved Theoretical Resilience to Power Attacks, IEEE Access 8 (</article-title>
          <year>2020</year>
          )
          <fpage>202728</fpage>
          -
          <lpage>202737</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2020</year>
          .
          <volume>3035163</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>E.C.</given-names>
            <surname>Laskari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.C.</given-names>
            <surname>Meletiou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.N.</given-names>
            <surname>Vrahatis</surname>
          </string-name>
          ,
          <article-title>Utilizing Evolutionary Computation Methods for the Design of S-Boxes</article-title>
          ,
          <source>International Conference on Computational Intelligence and Security</source>
          , (
          <year>2006</year>
          )
          <fpage>1299</fpage>
          -
          <lpage>1302</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCIAS.
          <year>2006</year>
          .
          <volume>295267</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Das</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Saha</surname>
          </string-name>
          , Chapter 6-
          <string-name>
            <given-names>Natureinspired</given-names>
            <surname>Optimization</surname>
          </string-name>
          <string-name>
            <surname>Algorithms</surname>
          </string-name>
          , Artificial Intelligence in Textile Engineering, Woodhead Publishing (
          <year>2024</year>
          )
          <fpage>171</fpage>
          -
          <lpage>231</lpage>
          . doi:
          <volume>10</volume>
          .1016/B978-0
          <source>- 443-15395-2</source>
          .
          <fpage>00002</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [53]
          <string-name>
            <surname>C.-W. Tsai</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C. Chiang</surname>
          </string-name>
          , Chapter
          <string-name>
            <surname>Seven-Genetic</surname>
            <given-names>algorithm</given-names>
          </string-name>
          ,
          <source>Handbook of Metaheuristic Algorithms</source>
          , Academic Press (
          <year>2023</year>
          )
          <fpage>111</fpage>
          -
          <lpage>138</lpage>
          . doi:
          <volume>10</volume>
          .1016/B978-0
          <source>-44-319108-4</source>
          .
          <fpage>00020</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [54]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kapuściński</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>Application of Genetic Algorithms in the Construction of Invertible Substitution Boxes</article-title>
          ,
          <source>Artificial Intelligence and Soft Computing, LNAI</source>
          <volume>9692</volume>
          (
          <year>2016</year>
          )
          <fpage>380</fpage>
          -
          <lpage>391</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -39378- 0_
          <fpage>33</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [55]
          <string-name>
            <surname>C.-W. Tsai</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-C. Chiang</surname>
          </string-name>
          , Chapter
          <string-name>
            <surname>Sixteen-Local Search</surname>
            <given-names>Algorithm</given-names>
          </string-name>
          , Handbook of Metaheuristic Algorithms, Academic Press (
          <year>2023</year>
          )
          <fpage>351</fpage>
          -
          <lpage>374</lpage>
          . doi:
          <volume>10</volume>
          .1016/B978-0
          <source>-44-319108-4</source>
          .
          <fpage>00030</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [56]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>WHS Cost Function for Generating S-boxes</article-title>
          ,
          <source>IEEE 8th International Conference on Problems of Infocommunications, Science and Technology</source>
          (
          <year>2021</year>
          )
          <fpage>434</fpage>
          -
          <lpage>438</lpage>
          . doi:
          <volume>10</volume>
          .1109/PICST54195.
          <year>2021</year>
          .
          <volume>9772133</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [57]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>Opportunities to Minimize Hardware and Software Costs for Implementing Boolean Functions in Stream Ciphers</article-title>
          ,
          <source>Int. J. Comput</source>
          .
          <volume>18</volume>
          (
          <year>2019</year>
          )
          <fpage>443</fpage>
          -
          <lpage>452</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [58]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>Optimization of a Simulated Annealing Algorithm for S-Boxes</article-title>
          <string-name>
            <surname>Generating</surname>
          </string-name>
          ,
          <source>Sensors</source>
          <volume>22</volume>
          (
          <year>2022</year>
          )
          <article-title>6073</article-title>
          . doi:
          <volume>10</volume>
          .3390/s22166073.
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [59]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>Generation of Nonlinear Substitutions by Simulated Annealing Algorithm</article-title>
          , Inf.
          <volume>14</volume>
          (
          <year>2023</year>
          )
          <article-title>259</article-title>
          . doi:
          <volume>10</volume>
          .3390/info14050259.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>