<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Evolutionary approach to S-box generation: Optimizing nonlinear substitutions in symmetric ciphers ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Kuznetsov</surname></persName>
							<email>oleksandr.kuznetsov@uniecampus.it</email>
							<affiliation key="aff0">
								<orgName type="institution">eCampus University</orgName>
								<address>
									<addrLine>10 Via Isimbardi</addrLine>
									<postCode>22060</postCode>
									<settlement>Novedrate</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">V. N</orgName>
								<orgName type="institution">Karazin Kharkiv National University</orgName>
								<address>
									<addrLine>4 Svobody sq</addrLine>
									<postCode>61022</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">University of Macerata</orgName>
								<address>
									<addrLine>30/32 Via Crescimbeni</addrLine>
									<postCode>62100</postCode>
									<settlement>Macerata</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nikolay</forename><surname>Poluyanenko</surname></persName>
							<affiliation key="aff1">
								<orgName type="department">V. N</orgName>
								<orgName type="institution">Karazin Kharkiv National University</orgName>
								<address>
									<addrLine>4 Svobody sq</addrLine>
									<postCode>61022</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Emanuele</forename><surname>Frontoni</surname></persName>
							<email>emanuele.frontoni@unimc.it</email>
							<affiliation key="aff2">
								<orgName type="institution">University of Macerata</orgName>
								<address>
									<addrLine>30/32 Via Crescimbeni</addrLine>
									<postCode>62100</postCode>
									<settlement>Macerata</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marco</forename><surname>Arnesano</surname></persName>
							<email>marco.arnesano@uniecampus.it</email>
							<affiliation key="aff0">
								<orgName type="institution">eCampus University</orgName>
								<address>
									<addrLine>10 Via Isimbardi</addrLine>
									<postCode>22060</postCode>
									<settlement>Novedrate</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksii</forename><surname>Smirnov</surname></persName>
							<email>dr.smirnovoa@gmail.com</email>
							<affiliation key="aff3">
								<orgName type="institution">Central Ukrainian National Technical University</orgName>
								<address>
									<addrLine>8 University ave</addrLine>
									<postCode>25006</postCode>
									<settlement>Kropyvnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Evolutionary approach to S-box generation: Optimizing nonlinear substitutions in symmetric ciphers ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">91DD7AC3E15791FF07452CED5F7E8158</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:06+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>S-box generation</term>
					<term>genetic algorithms</term>
					<term>nonlinear substitutions</term>
					<term>Walsh-Hadamard spectrum</term>
					<term>cryptographic primitives</term>
					<term>heuristic optimization</term>
					<term>cryptographic strength1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This study explores the application of genetic algorithms in generating highly nonlinear substitution boxes (S-boxes) for symmetric key cryptography. We present a novel implementation that combines a genetic algorithm with the Walsh-Hadamard Spectrum (WHS) cost function to produce 8×8 S-boxes with a nonlinearity of 104. Our approach achieves performance parity with the best-known methods, requiring an average of 49,399 iterations with a 100% success rate. The study demonstrates significant improvements over earlier genetic algorithm implementations in this field, reducing iteration counts by orders of magnitude. By achieving equivalent performance through a different algorithmic approach, our work expands the toolkit available to cryptographers and highlights the potential of genetic methods in cryptographic primitive generation. The adaptability and parallelization potential of genetic algorithms suggests promising avenues for future research in S-box generation, potentially leading to more robust, efficient, and innovative cryptographic systems. Our findings contribute to the ongoing evolution of symmetric key cryptography, offering new perspectives on optimizing critical components of secure communication systems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The realm of digital security is in a constant state of evolution, with symmetric key cryptography serving as a fundamental pillar in the architecture of secure communication systems <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>. At the core of many symmetric encryption algorithms lie Substitution boxes (Sboxes) <ref type="bibr" target="#b3">[4]</ref>, which play a pivotal role in establishing the nonlinear components essential for robust encryption <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>. These S-boxes are critical in creating the confusion and diffusion properties that Claude Shannon identified as crucial for secure ciphers <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>.</p><p>The cryptographic strength of an S-box is multifaceted, encompassing several key indicators <ref type="bibr" target="#b8">[9]</ref>. Nonlinearity, which quantifies an S-box's resistance to linear cryptanalysis, stands as a primary measure. For 8×8 S-boxes, commonly employed in modern ciphers, achieving a nonlinearity of 104 represents a significant benchmark <ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref>. However, other properties such as differential uniformity, algebraic degree, and algebraic immunity also play crucial roles in determining an S-box's overall cryptographic efficacy <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>.</p><p>While algebraically constructed S-boxes, such as the one used in the Advanced Encryption Standard (AES) with its optimal nonlinearity of 112 <ref type="bibr" target="#b14">[15]</ref>, might seem ideal, they are not without vulnerabilities. The presence of inherent algebraic structures in such S-boxes can create potential weaknesses, making them susceptible to algebraic cryptanalysis <ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref>. This vulnerability underscores the need for randomly generated S-boxes that lack hidden algebraic structures, thereby enhancing resistance against sophisticated cryptanalytic techniques <ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref>.</p><p>The generation of cryptographically robust S-boxes presents a significant computational challenge. The vast search space of possible configurations for 8×8 S-boxes is estimated at 2 8 ! (approximately 10 506 ), renders exhaustive search methods impractical. This complexity has driven research towards heuristic approaches for S-box generation <ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref>. Methods such as simulated annealing, hill climbing, and genetic algorithms have shown promise in navigating this expansive solution space efficiently <ref type="bibr" target="#b24">[25]</ref>.</p><p>Recent advances in heuristic S-box generation have made significant advances. Researchers have studied various cost functions, including the Walsh-Hadamard spectrum (WHS) function <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b25">26]</ref>, the Picek cost function (PCF) <ref type="bibr" target="#b9">[10]</ref>, improved Walsh-Hadamard spectrum-based cost functions (WCF) <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b26">27]</ref>, and two new extended cost functions (ECF and WCFS) <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b27">28,</ref><ref type="bibr" target="#b28">29]</ref> in conjunction with different search algorithms <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b21">22]</ref>. These efforts have progressively reduced the computational cost of generating highly nonlinear S-boxes, with some methods achieving the target nonlinearity of 104 in fewer than 100,000 iterations.</p><p>Despite these advancements, there remains a gap in understanding the full potential of genetic algorithms in this domain. While genetic approaches have been applied to Sbox generation, their performance in comparison to other heuristic methods, particularly in terms of consistency and efficiency in generating S-boxes with optimal cryptographic properties, remains an area ripe for exploration.</p><p>Our study aims to address this gap by presenting a comprehensive investigation into the application of genetic algorithms for generating 8×8 S-boxes with a nonlinearity of 104. We explore the synergy between genetic algorithms and the WHS cost function, aiming to match or surpass the efficiency of existing methods while leveraging the inherent advantages of evolutionary approaches, such as adaptability and the potential for parallelization.</p><p>The remainder of this paper is structured as follows: Section 2 provides a comprehensive review of the literature, detailing the evolution of S-box generation techniques and the current state of the art. Section 3 offers a background on S-boxes, their cryptographic properties, and the theoretical foundations underpinning their design. Section 4 delineates our methodology and experimental setup, including the specifics of our genetic algorithm implementation and evaluation criteria. Section 5 presents our results and a detailed discussion, comparing our findings with existing methods and analyzing their implications. Finally, Section 6 concludes the paper, summarizing our key findings and outlining promising directions for future research in this critical area of cryptographic system design.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Literature review</head><p>The design and generation of cryptographically strong Sboxes have been subjects of intensive research in the field of symmetric key cryptography. This section provides a comprehensive review of the existing literature, focusing on various approaches to S-box generation and their cryptographic properties.</p><p>Algebraic constructions of S-boxes, such as those based on finite field inversion used in the Advanced Encryption Standard (AES) <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b29">30,</ref><ref type="bibr" target="#b30">31]</ref>, have been widely studied. However, as <ref type="bibr" target="#b15">Bard (2009)</ref>  <ref type="bibr" target="#b15">[16]</ref> and Courtois and Bard (2007) <ref type="bibr" target="#b16">[17]</ref> point out, these constructions may be vulnerable to algebraic attacks due to their inherent mathematical structure. This vulnerability has led to increased interest in generating S-boxes with more complex algebraic structures <ref type="bibr" target="#b31">[32]</ref>.</p><p>Heuristic approaches have gained significant traction in recent years. <ref type="bibr" target="#b25">Clark et al. (2005)</ref>  <ref type="bibr" target="#b25">[26]</ref> introduced a simulated annealing approach for S-box generation <ref type="bibr" target="#b22">[23]</ref>, demonstrating its effectiveness in producing S-boxes with high nonlinearity. Building on this work, <ref type="bibr" target="#b32">Souravlias et al. (2017)</ref>  <ref type="bibr" target="#b32">[33]</ref> proposed an algorithm portfolio approach combining simulated annealing and tabu search, showing improved results under limited time budgets.</p><p>Genetic algorithms have also been explored for S-box generation <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b33">34]</ref>. <ref type="bibr" target="#b34">Tesar (2010)</ref>  <ref type="bibr" target="#b34">[35]</ref> combined a genetic algorithm with a tree search method, generating 8×8 Sboxes with nonlinearity up to 104. <ref type="bibr" target="#b10">Picek et al. (2016)</ref>  <ref type="bibr" target="#b10">[11]</ref> presented a novel cost function for evolving S-boxes, achieving significant improvements in both speed and quality of results compared to previous approaches. <ref type="bibr">Ivanov et al. (2016a</ref><ref type="bibr">Ivanov et al. ( , 2016b) )</ref>  <ref type="bibr" target="#b35">[36,</ref><ref type="bibr" target="#b36">37]</ref> introduced an innovative approach using a modified immune algorithm combined with hill climbing, rapidly generating large sets of highly nonlinear bijective S-boxes. Their work demonstrated the potential of hybrid approaches in S-box generation.</p><p>Recent advancements have focused on improving specific cryptographic properties. <ref type="bibr" target="#b37">Rodinko et al. (2017)</ref>  <ref type="bibr" target="#b37">[38]</ref> optimized a method for generating high nonlinear S-boxes, achieving nonlinearity of 104, algebraic immunity of 3, and 8-uniformity within reasonable computational time. Freyre Echevarría and Martínez Díaz (2020) <ref type="bibr" target="#b26">[27]</ref> proposed a new cost function specifically designed to improve the nonlinearity of bijective S-boxes.</p><p>The importance of multiple cryptographic criteria has been emphasized in recent literature. Freyre-Echevarría et al. (2020) <ref type="bibr" target="#b9">[10]</ref> introduced an external parameterindependent cost function for evolving bijective S-boxes, considering both nonlinearity and other important properties. Their work highlighted the need for balanced optimization across multiple cryptographic criteria.</p><p>More recent studies have explored novel approaches to S-box generation. Artuğer and Özkaynak (2024) <ref type="bibr" target="#b38">[39]</ref> proposed a post-processing approach to improve the nonlinearity of chaos-based S-boxes, addressing a longstanding challenge in this area. <ref type="bibr" target="#b39">Haider et al. (2024)</ref>  <ref type="bibr" target="#b39">[40]</ref> introduced an S-box generator based on elliptic curves, offering a balance between randomization and optimization with minimal computation time.</p><p>The application of S-boxes in specific cryptographic contexts has also been a focus of recent research. <ref type="bibr" target="#b40">Jamal et al. (2024)</ref>  <ref type="bibr" target="#b40">[41]</ref> developed a region of interest-based medical image encryption technique using chaotic S-boxes, demonstrating the practical applications of advanced S-box designs in specialized domains.</p><p>Emerging threats and the need for enhanced security have led to new considerations in S-box design. <ref type="bibr" target="#b41">Fahd et al. (2024)</ref>  <ref type="bibr" target="#b41">[42]</ref> examined the reality of backdoored S-boxes, highlighting the importance of thorough cryptanalysis and the potential vulnerabilities in S-box structures.</p><p>In conclusion, the literature reveals a trend towards more sophisticated, multi-criteria optimization approaches in S-box generation. While significant progress has been made in achieving high nonlinearity and other desirable properties, there remains a need for methods that can consistently produce S-boxes with optimal cryptographic characteristics while balancing computational efficiency and resistance to emerging cryptanalytic techniques.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Background</head><p>Symmetric cryptography forms the backbone of secure communication in the digital age. At the heart of many symmetric ciphers lie Substitution boxes (S-boxes), nonlinear components crucial for ensuring the security and robustness of these cryptographic systems. This section provides a comprehensive overview of S-boxes, their role in symmetric cryptography, and the application of genetic algorithms in their optimization.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">S-boxes in symmetric cryptography</head><p>Substitution boxes (S-boxes) are fundamental components in symmetric-key algorithms, serving as the primary source of nonlinearity <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. An S-box is essentially a vectorial Boolean function that maps a fixed number of input bits to a fixed number of output bits. Formally, an n×m S-box can be defined as <ref type="bibr" target="#b8">[9]</ref>:</p><formula xml:id="formula_0">2 2 : n m S  F F ,</formula><p>where 𝐹 and 𝐹 are vector spaces over the Galois field GF(2) with dimensions n and m, respectively.</p><p>The cryptographic strength of an S-box is determined by several critical properties <ref type="bibr" target="#b9">[10]</ref>:</p><p>1) Nonlinearity: A measure of the distance between the S-box and the set of all affine functions. For an n×n S-box, the nonlinearity is defined as:</p><formula xml:id="formula_1">2 2 2 1 ( , 0 \ ) 1 ( ) 2 max ( 1) 2 n n n n b S x a x a b x NL S            F F F</formula><p>, where denotes the dot product and ⊕ represents bitwise XOR.</p><p>2) Differential uniformity: Quantifies the uniformity of output differences when the input is changed. The differential uniformity δ is given by:</p><formula xml:id="formula_2">2 0, max | : ( ) ( ) | n a b x S x S x a b        F .</formula><p>3) Algebraic degree: The highest degree among the component Boolean functions of S. For an n×m S-box, the algebraic degree is:</p><formula xml:id="formula_3">2 \0 ( ) max ( ) m v deg S deg v S    F . 4</formula><p>) Balancedness: An S-box is balanced if each output occurs with equal probability when the input is uniformly distributed.</p><p>5) Algebraic Immunity <ref type="bibr" target="#b42">[43]</ref>: A measure of resistance against algebraic attacks. For an S-box 𝑆: 𝐹 → 𝐹 , the algebraic immunity is defined as:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>  ( ) min deg( ), ( ) AI S P P I S  </head><p>, where I(S) is the ideal generated by the polynomials representing the S-box:</p><formula xml:id="formula_4">1 1 1 2 2 2 1 2 1 2</formula><p>( , ,..., ), ( , ,..., ), ( ) ..., ( , ,..., )</p><formula xml:id="formula_5">n n m m n y f x x x y f x x x I S y f x x x                   .</formula><p>The algebraic immunity can be computed by constructing the minimal reduced Gröbner basis of the ideal I(S) using the degree reverse lexicographic (degrevlex) ordering, and finding the polynomial of minimum degree in this basis. These properties collectively contribute to the S-box's ability to resist various cryptanalytic attacks, including differential, linear, and algebraic cryptanalysis. The concept of algebraic immunity for S-boxes, as introduced by Faugère and Perret, provides a crucial measure of resistance against algebraic attacks, which attempt to express the cipher as a system of low-degree multivariate polynomial equations.</p><p>The relationship between the algebraic immunity of an S-box and that of Boolean functions can be established through the following construction. Consider a Boolean function 𝑓 : 𝐹 → 𝐹 defined as <ref type="bibr" target="#b43">[44,</ref><ref type="bibr" target="#b44">45]</ref>:</p><formula xml:id="formula_6">1 2 1 2 1 2 1 2</formula><p>( , ,..., , , ,..., )</p><p>1, if , : ( , ,..., ) 0, if , : ( , ,..., ) ;</p><p>.</p><formula xml:id="formula_7">S n m i n j i n j f x x x y y y i j f x x x y i j f x x x y           </formula><p>The algebraic immunity of the S-box S is then equivalent to the minimum degree of non-zero polynomials in the annihilator of fS:</p><formula xml:id="formula_8">( ) min ( ) | ( ) S AI S deg g g Ann f  </formula><p>. This formulation provides a bridge between the algebraic immunity of vectorial Boolean functions (S-boxes) and that of single Boolean functions, unifying the concept across different cryptographic primitives.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Importance of S-boxes in modern ciphers and the need for randomness</head><p>S-boxes play a pivotal role in ensuring the security of symmetric ciphers by introducing nonlinearity and complexity into the encryption process <ref type="bibr" target="#b6">[7]</ref>. They are employed in widely-used algorithms such as the Advanced Encryption Standard (AES) <ref type="bibr" target="#b14">[15]</ref>, where the SubBytes operation relies on a carefully designed 8×8 S-box. However, the increasing sophistication of cryptanalytic techniques has necessitated a reevaluation of traditional Sbox design methods. While algebraically constructed S-boxes, such as those used in AES (based on finite field inverses) <ref type="bibr" target="#b29">[30,</ref><ref type="bibr" target="#b30">31]</ref>, offer certain advantages in terms of implementation efficiency and some cryptographic properties, they may fall short in terms of algebraic immunity <ref type="bibr" target="#b42">[43]</ref>. The structured nature of these S-boxes can potentially lead to vulnerabilities against algebraic attacks, which have gained significant attention in recent years <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>.</p><p>Algebraic attacks exploit the possibility of expressing the cipher as a system of low-degree multivariate polynomial equations <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b17">18]</ref>. The complexity of solving such systems is closely related to the algebraic immunity of the S-box <ref type="bibr" target="#b42">[43]</ref>. A low algebraic immunity allows for a simpler representation of the cipher, potentially reducing the computational effort required for cryptanalysis <ref type="bibr" target="#b43">[44,</ref><ref type="bibr" target="#b44">45]</ref>. This vulnerability has prompted researchers to explore alternative methods for S-box generation that prioritize high algebraic immunity alongside other critical properties.</p><p>To address these concerns, there is growing interest in the cryptographic community in random or pseudo-random Sboxes <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b45">46,</ref><ref type="bibr" target="#b46">47]</ref>. These S-boxes, generated through heuristic methods, offer several advantages:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Higher algebraic immunity: Random S-boxes are less likely to exhibit algebraic structures that can be exploited in attacks, potentially leading to higher algebraic immunity values.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Resistance to specialized attacks: Algebraically constructed S-boxes might be vulnerable to attacks tailored to their specific structure. Random Sboxes, lacking such predictable structures, can offer better protection against these targeted attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Flexibility in design: Heuristic methods allow for the optimization of multiple cryptographic criteria simultaneously, enabling a more balanced approach to S-box design.</p><p>Adaptability to evolving threat models: As new cryptanalytic techniques emerge, the criteria for S-box generation can be adjusted more easily with heuristic methods compared to algebraic constructions.</p><p>Various heuristic approaches have been proposed for generating high-quality random S-boxes, including:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Simulated Annealing <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b25">26,</ref><ref type="bibr" target="#b32">33,</ref><ref type="bibr" target="#b47">48]</ref>: This method mimics the physical process of annealing in metallurgy, gradually "cooling" the system to find an optimal configuration. It has shown promise in generating S-boxes with good cryptographic properties.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Hill Climbing <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b35">36,</ref><ref type="bibr" target="#b48">49,</ref><ref type="bibr" target="#b49">50]</ref>: A local search algorithm that iteratively makes small improvements to a candidate solution. This approach can be effective in fine-tuning S-box properties.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Genetic Algorithms <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b34">35,</ref><ref type="bibr" target="#b36">37,</ref><ref type="bibr" target="#b50">51]</ref>: Evolutionary approaches that mimic natural selection to evolve a population of S-boxes towards desired properties. These algorithms have demonstrated the ability to generate S-boxes with excellent cryptographic characteristics, including high algebraic immunity.</p><p>In this work, we focus on genetic algorithms due to their ability to efficiently explore large search spaces and handle multi-objective optimization problems. Genetic algorithms offer a promising approach to generating S-boxes that balance multiple cryptographic criteria, including high algebraic immunity, nonlinearity, and differential uniformity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Genetic algorithms for S-box generation</head><p>Genetic Algorithms (GAs) are stochastic optimization techniques inspired by the principles of natural selection and evolution <ref type="bibr" target="#b51">[52,</ref><ref type="bibr" target="#b52">53]</ref>. They operate on a population of potential solutions, evolving them over successive generations to improve their fitness concerning a defined objective function. In the context of S-box generation, GAs offer a powerful and flexible approach to optimizing multiple cryptographic properties simultaneously <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b36">37,</ref><ref type="bibr" target="#b53">54]</ref>.</p><p>The fundamental principle of GAs is to emulate the process of natural selection, where the fittest individuals are more likely to survive and reproduce, passing their beneficial traits to future generations <ref type="bibr" target="#b51">[52,</ref><ref type="bibr" target="#b52">53]</ref>. In the case of S-box generation, an "individual" represents a candidate Sbox, and its "fitness" is determined by how well it satisfies the desired cryptographic properties.</p><p>The basic structure of a GA includes the following components <ref type="bibr" target="#b53">[54,</ref><ref type="bibr" target="#b54">55]</ref>: Select parents for reproduction using tournament selection 5.</p><formula xml:id="formula_9"></formula><p>Create new population P' through crossover and mutation: 6.</p><p>For i = 1 to N/2 do 7.</p><p>Select two parents p1 and p2 from P 8.</p><p>If random (0,1) &lt; pc then 9.</p><p>(c1, c2) = Crossover(p1, p2) 10.</p><p>Else 11.</p><p>(c1, c2) = (p1, p2) 12.</p><p>End If 13.</p><p>Mutate c1 and c2 with probability pm 14.</p><p>Add c1 and c2 to P' 15.</p><p>End For The fitness function is crucial in guiding the evolutionary process towards S-boxes with desired cryptographic properties.</p><p>The selection mechanism, often implemented as tournament selection, ensures that fitter individuals have a higher chance of being chosen for reproduction. This process mimics natural selection, where more adapted individuals are more likely to pass on their genes.</p><p>Crossover operators for S-boxes must be carefully designed to preserve the bijective property. One approach is to use a permutation-based crossover, where segments of the S-box permutation are exchanged between parents. For example, given two parent S-boxes P1 and P2, a two-point crossover might produce offspring C1 and C2 as follows:  . Mutation operators introduce small random changes to maintain genetic diversity and prevent premature convergence. For S-boxes, this might involve swapping two randomly chosen elements or applying a random permutation to a subset of elements.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Modified genetic algorithm</head><p>Our research focuses on developing and implementing a modified genetic algorithm for generating cryptographically strong S-boxes. This section details our approach, the algorithm's structure, and the experimental setup used to evaluate its performance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Modified genetic algorithm overview</head><p>We have developed a modified genetic algorithm that incorporates elements of hill climbing, enhancing its ability to navigate the complex search space of S-box configurations. This approach allows for a more targeted exploration of promising regions while maintaining the population-based nature of genetic algorithms.</p><p>The core idea of our algorithm is to maintain a population of S-boxes, subject them to controlled mutations, evaluate their cryptographic properties, and selectively propagate the best specimens to subsequent generations. This process is iterated until either an S-box meeting the desired criteria is found or a predefined computational limit is reached. The pseudocode for our modified genetic algorithm is: The elite selection function performs a crucial role in our algorithm. It ranks the S-boxes based on their nonlinearity and objective function values, prioritizing higher nonlinearity and lower objective function values. This function ensures that only the top Kpop S-boxes survive to the next generation, maintaining a high-quality population.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Mutation operator</head><p>Our mutation operator is designed to preserve the bijectivity of the S-box while introducing controlled randomness. It operates by swapping two randomly selected (distinct) elements within the S-box. This approach ensures that the fundamental property of bijectivity is maintained throughout the evolutionary process.</p><p>Formally, the mutation can be described as:</p><formula xml:id="formula_10">[ ] [ ], [ ] [ ] S i S j S j S i    </formula><p>, where 𝑖, 𝑗 ∈ 0,1, … , 255, 𝑖 ≠ 𝑗 and all other elements remain unchanged.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Objective function</head><p>The choice of objective function is critical in guiding the evolutionary process towards cryptographically strong Sboxes. We employ the WHS function proposed by Clark et al. <ref type="bibr" target="#b25">[26]</ref>, which has shown effectiveness in generating highquality S-boxes. The WHS function is defined as <ref type="bibr" target="#b25">[26]</ref>:</p><formula xml:id="formula_11">255 255 1 0 | [ , ] | R b i W X WH b i HS T    </formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>, where WHT[b,i] represents the Walsh-Hadamard transform coefficients; i iterate over all component functions and their linear combinations; b iterates over all linear functions; X and R are real-valued parameters.</p><p>Based on empirical studies, we set R = 12 and X = 0, which has been shown to yield optimal results in generating bijective S-boxes with high nonlinearity <ref type="bibr" target="#b55">[56,</ref><ref type="bibr" target="#b56">57]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4.">Evaluation criteria</head><p>The primary criteria for evaluating the generated S-boxes are: The evaluate function in our algorithm computes these properties for each generated S-box, allowing us to assess its cryptographic strength comprehensively.</p><formula xml:id="formula_12"></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5.">Experimental setup</head><p>Our experiments were conducted on a high-performance computing cluster to handle the computational intensity of the S-box generation process. The implementation was done in C++ for efficiency, with parallelization to utilize multiple cores.</p><p>Given that the calculation of the objective function is the most computationally expensive operation in terms of processor time, the complexity of the entire search algorithm can be considered proportional to the number of times the objective function is calculated. This corresponds to the number of S-boxes that were generated and evaluated. We denote this quantity as KSbox.</p><p>To accelerate the algorithm's performance, we implemented parallel computation of the new population using Nthread = 8 threads within each iteration. This parallelization significantly reduced the overall execution time of the algorithm.</p><p>We conducted a comprehensive parameter sweep to analyze the impact of population size and mutation rate on the quality of the generated S-boxes and the algorithm's convergence rate. Specifically:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Population size (Kpop) was varied from 1 to 21 with a step size of 2.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>The mutation rate (Kmut) was varied from 1 to 31 with a step size of 3.</p><p>For each combination of Kpop and Kmut, we performed 100 independent runs of the search algorithm to ensure statistical significance. This resulted in a total of 11×11×100 = 12,100 experimental runs.</p><p>The algorithm was set to terminate upon finding an Sbox with nonlinearity ≥ 104 or reaching the maximum iteration limit of 150,000. For each run, we recorded the number of S-boxes generated and evaluated (KSbox), which serves as our primary metric for computational efficiency.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Results and discussion</head><p>This section presents the results of our comprehensive experimental study on the modified genetic algorithm for Sbox generation. We analyze the performance of the algorithm across various parameter configurations and discuss the implications of our findings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Overview of experimental results</head><p>Our primary metric for evaluating the algorithm's efficiency is KSbox, which represents the number of S-boxes generated and evaluated before finding an S-box with the desired nonlinearity of 104. Table <ref type="table">1</ref> presents the average KSbox values for different combinations of population size (Kpop) and mutation rate (Kmut).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Analysis of population size impact</head><p>One of the most striking observations from our results is the superior performance of the algorithm when Kpop = 1. This configuration consistently yielded the lowest KSbox values across all mutation rates, with averages ranging from 49,277 to 58,213. This finding is somewhat counterintuitive, as genetic algorithms typically benefit from larger population sizes that provide greater genetic diversity.</p><p>The effectiveness of a single-individual population suggests that our algorithm's behavior in this configuration closely resembles that of a stochastic hill-climbing method. This approach appears to be particularly well-suited to the S-box optimization problem, possibly due to the following factors:</p><p>Landscape structure: The fitness landscape of S-box configurations may have numerous local optima that are relatively close in quality to the global optimum. In such a scenario, an aggressive local search can be highly effective.</p><p>Mutation operator efficiency: Our swap-based mutation operator appears to be sufficiently powerful to navigate the search space effectively, even without the diversity typically provided by a larger population.</p><p>Reduced computational overhead: With Kpop = 1, the algorithm avoids the computational cost associated with managing and evaluating a large population, allowing for more iterations within the same computational budget.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3.">Impact of mutation rate</head><p>While the population size shows a clear trend, the impact of the mutation rate (Kmut) is more nuanced. For Kpop = 1, we observe that:</p><p>The lowest KSbox (49,277) was achieved with Kmut = 7. Performance generally degraded with higher mutation rates, with KSbox increasing to 58,213 at Kmut = 1. This pattern suggests that there exists an optimal balance between exploration and exploitation in the search process. Lower mutation rates may lead to premature convergence, while higher rates may disrupt good solutions too frequently.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.4.">Scalability and computational efficiency</head><p>As Kpop increases, we observe a general trend of increasing KSbox values, indicating reduced computational efficiency. This scaling behavior can be attributed to:</p><p> Increased evaluation overhead: Larger populations require more objective function evaluations per generation.</p><p> Slower convergence: Diversity maintenance in larger populations may slow down the convergence to high-quality solutions.</p><p>However, it's worth noting that larger populations might offer benefits not captured by the KSbox metric alone, such as increased robustness or the ability to find a more diverse set of high-quality S-boxes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.5.">Parallelization performance</head><p>Our implementation of parallel computation using 8 threads (Nthread = 8) has proven to be effective in accelerating the search process. This parallelization strategy is particularly beneficial for configurations with larger Kpop and Kmut values, where the workload can be more evenly distributed across threads.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>The average number of S-boxes generated (KSbox) before finding an S-box with Nf = 104 Kmut Kpop </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.6.">Comparison with existing methods</head><p>The best-performing configuration of our algorithm (Kpop = 1, Kmut = 7) achieves an average KSbox of 49,277. To contextualize our findings within the broader landscape of S-box generation research, we conducted a comprehensive comparison of our genetic algorithm approach with existing methods. Table <ref type="table" target="#tab_5">2</ref> presents this comparative analysis, encompassing various techniques and cost functions employed in the field. Our genetic algorithm implementation, utilizing the WHS cost function, achieves results that are on par with the bestknown methods in the field. Specifically, our approach generates S-boxes with a nonlinearity of 104 in an average of 49,399 iterations, with a 100% success rate. This performance is comparable to our previous works using hill climbing <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b27">28]</ref>, which required 50,000 iterations on average.</p><p>Several key observations emerge from this comparative analysis:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Parity in Performance: Our genetic algorithm achieves results that are statistically equivalent to the best-known methods, particularly our earlier hill-climbing approach. This parity is significant, as it demonstrates the versatility and potential of genetic algorithms in this domain.  Algorithmic Diversity: By achieving comparable results through a different algorithmic approach, we have expanded the toolkit available to cryptographers and security researchers. This diversity in high-performing methods enhances the robustness of S-box generation techniques.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Consistency and Reliability: Like our previous best results, the genetic algorithm maintains a 100% success rate in generating target S-boxes with nonlinearity 104. This level of reliability is crucial for practical applications in cryptographic system design.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Efficiency Across Methods: The similarity in performance between our genetic algorithm and hill climbing approaches (49,399 vs. 50,000 iterations) suggests that we may be approaching theoretical limits of efficiency for generating Sboxes with these properties using heuristic methods.</p><p>Progress from Earlier Genetic Approaches: Compared to earlier genetic algorithm implementations <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b34">35]</ref>, our method shows substantial improvement, reducing the required iterations by orders of magnitude while achieving higher nonlinearity.</p><p>The achievement of parity with the best-known results using a genetic algorithm is particularly noteworthy and underscores the potential of evolutionary approaches in cryptographic primitive generation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.7.">Practical Implications</head><p>The superior performance of the Kpop = 1 configuration has important implications for the practical application of our algorithm:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Resource efficiency: The algorithm can be effectively run on systems with limited computational resources, as it doesn't require maintaining a large population.  Simplicity: The simplified population management makes the algorithm easier to implement and tune.  Adaptability: The algorithm's efficiency makes it suitable for scenarios where S-boxes need to be generated or updated frequently. In conclusion, our modified genetic algorithm demonstrates exceptional efficiency in generating cryptographically strong S-boxes, particularly in its hillclimbing-like configuration. These findings contribute valuable insights to the field of cryptographic primitive design and offer a powerful tool for the development of secure symmetric encryption systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>This study presents a significant advancement in the field of S-box generation for symmetric key cryptography, focusing on the application of genetic algorithms to produce highly nonlinear substitutions. Our research demonstrates that genetic algorithms, when properly optimized and combined with the Walsh-Hadamard Spectrum (WHS) cost function, can achieve performance parity with the best-known methods in generating 8×8 S-boxes with a nonlinearity of 104.</p><p>Key findings of our work include:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>The genetic algorithm approach achieves an average of 49,399 iterations to generate target S-boxes, comparable to the best results of 50,000 iterations using hill-climbing methods.  A 100% success rate in producing S-boxes with the desired nonlinearity, matching the reliability of top-performing techniques.  A significant improvement over earlier genetic algorithm implementations, reducing iteration counts by orders of magnitude.</p><p>The achievement of performance parity using a different algorithmic approach expands the toolkit available to cryptographers and highlights the versatility of genetic methods in cryptographic primitive generation. This diversity in high-performing techniques enhances the robustness of S-box generation methodologies. Furthermore, our results underscore the potential of genetic algorithms in this domain, particularly their adaptability to evolving cryptographic criteria and their inherent parallelization capabilities. These characteristics position genetic approaches as promising avenues for future research, potentially leading to more efficient, flexible, and innovative S-box generation techniques.</p><p>In conclusion, while not surpassing existing methods in raw performance, our genetic algorithm approach offers a valuable alternative that matches the best-known results. This equivalence, coupled with the unique advantages of genetic algorithms, opens new perspectives in cryptographic research and development. Future work should focus on exploiting these advantages, potentially through hybridization with other heuristic methods or by leveraging parallel computing architectures to further enhance S-box generation efficiency.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 2</head><label>2</label><figDesc>Comparison of S-box Generation Methods</figDesc><table><row><cell></cell><cell>Method</cell><cell>Cost Function</cell><cell cols="2">Algorithm NL</cell><cell>Success Rate, %</cell><cell>Avg. Iterations</cell></row><row><cell></cell><cell>[23,26]</cell><cell>WHS</cell><cell>SA</cell><cell>102</cell><cell>0.5 -</cell></row><row><cell></cell><cell>[23]</cell><cell>WHS</cell><cell>SA</cell><cell>104</cell><cell>-</cell><cell>30,000,000</cell></row><row><cell></cell><cell>[35]</cell><cell>WHS</cell><cell>HC</cell><cell>100</cell><cell>-</cell><cell>2,500</cell></row><row><cell></cell><cell>[35]</cell><cell>WHS</cell><cell>GaT</cell><cell>104</cell><cell>-</cell><cell>3,239,000</cell></row><row><cell></cell><cell>[11]</cell><cell>WHS</cell><cell>Ga</cell><cell>102</cell><cell>-</cell><cell>28,200</cell></row><row><cell></cell><cell>[11]</cell><cell>WHS</cell><cell>GaT</cell><cell>104</cell><cell>-</cell><cell>3,849,881</cell></row><row><cell></cell><cell>[11]</cell><cell>WHS</cell><cell>LSA</cell><cell>102</cell><cell>-</cell><cell>6,701</cell></row><row><cell></cell><cell>[11]</cell><cell>PCF</cell><cell>Ga</cell><cell>104</cell><cell>-</cell><cell>741,371</cell></row><row><cell></cell><cell>[11]</cell><cell>PCF</cell><cell>GaT</cell><cell>104</cell><cell>-</cell><cell>167,451</cell></row><row><cell></cell><cell>[11]</cell><cell>PCF</cell><cell>LSA</cell><cell>104</cell><cell>-</cell><cell>172,280</cell></row><row><cell></cell><cell>[27]</cell><cell>WCF</cell><cell>LSA</cell><cell>104</cell><cell>-</cell><cell>89,460</cell></row><row><cell></cell><cell>[27]</cell><cell>WCF</cell><cell>HC</cell><cell>104</cell><cell>37</cell><cell>65,933</cell></row><row><cell></cell><cell>[58]</cell><cell>WHS</cell><cell>SA</cell><cell>104</cell><cell>56.4</cell><cell>450,000</cell></row><row><cell></cell><cell>[48]</cell><cell>WCF</cell><cell>SA</cell><cell>104</cell><cell>100</cell><cell>65,000</cell></row><row><cell></cell><cell>[48,59]</cell><cell>ECF</cell><cell>SA</cell><cell>104</cell><cell>100</cell><cell>55,000 … 83,000</cell></row><row><cell></cell><cell>[49]</cell><cell>WHS</cell><cell>HC</cell><cell>104</cell><cell>100</cell><cell>50,000</cell></row><row><cell></cell><cell>[6,28]</cell><cell>WCFS</cell><cell>HC</cell><cell>104</cell><cell>100</cell><cell>50,000</cell></row><row><cell></cell><cell>Our work</cell><cell>WHS</cell><cell>Ga</cell><cell>104</cell><cell>100</cell><cell>49,399</cell></row><row><cell cols="4">However, it's important to note that while this</cell><cell></cell><cell></cell></row><row><cell cols="4">configuration is optimal for finding a single high-quality</cell><cell></cell><cell></cell></row><row><cell cols="4">S-box, alternative configurations may be more suitable</cell><cell></cell><cell></cell></row><row><cell cols="4">for generating a diverse set of S-boxes or for multi-</cell><cell></cell><cell></cell></row><row><cell cols="3">objective optimization scenarios.</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">5.8. Limitations and future work</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="4">While our results are promising, several avenues for</cell><cell></cell><cell></cell></row><row><cell cols="2">future research remain:</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">Extended cryptographic criteria: Incorporate</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">additional criteria such as algebraic immunity</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">and differential uniformity into the objective</cell><cell></cell><cell></cell></row><row><cell></cell><cell>function.</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">Adaptive parameter tuning: Develop methods</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">to dynamically adjust Kpop and Kmut during the</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="2">search process.</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">Alternative mutation operators: Explore more</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">sophisticated mutation strategies that leverage</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">domain-specific knowledge about S-box</cell><cell></cell><cell></cell></row><row><cell></cell><cell>structures.</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">Multi-objective optimization: Extend the</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">algorithm to simultaneously optimize multiple</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">cryptographic properties, potentially using</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="2">Pareto-based approaches.</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="funding">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>1 58,213 65,942 72,830 86,642 101,726 111,990 112,718 125,113 132,806 140,336 149,339 4 56,067 64,863 75,069 89,598 94,726 105,925 122,364 137,003 136,740 151,874 163,291 7 49,277 67,198 77,848 88,353 103,154 109,618 122,382 130,901 142,463 144,601 165,918 10 54,636 65,723 82,198 92,542 102,797 114,163 129,411 137,442 147,416 161,020 165,672 13 56,042 62,660 83,216 94,538 101,073 117,611 124,466 135,244 152,048 158,696 171,756 16 56,010 68,711 79,645 93,134 107,371 120,567 125,274 140,817 150,494 155,049 169,462 19 56,532 65,910 82,883 92,911 105,144 117,877 129,718 142,017 155,463 164,902 175,531 22 54,775 67,236 77,663 92,874 105,559 120,992 131,029 140,772 156,224 162,808 176,669 25 50,066 70,394 79,596 98,967 115,462 118,406 135,294 144,708 157,321 177,621 183,087 28 54,203 70,453 82,200 91,841 108,783 121,683 133,665 152,984 159,887 176,751 181,781 31 53,709 71,581 91,827 101,536 109,625 126,616 143,233 156,987 160,573 183,069 192,493</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">HDLBC: A Lightweight Block Cipher with High Diffusion</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.vlsi.2023.102090</idno>
	</analytic>
	<monogr>
		<title level="j">Integr</title>
		<imprint>
			<biblScope unit="volume">94</biblScope>
			<biblScope unit="page">102090</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Tiwari</surname></persName>
		</author>
		<idno type="DOI">10.1016/B978-0-323-96146-2.00011-5</idno>
		<title level="m">Chapter 14-Cryptography in Blockchain, Distributed Computing to Blockchain</title>
				<imprint>
			<publisher>Academic Press</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="251" to="265" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Chapter 8 -Codes and cyphers, Discrete Mathematics With Logic</title>
		<author>
			<persName><forename type="first">M</forename><surname>Milanič</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Servatius</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Servatius</surname></persName>
		</author>
		<idno type="DOI">10.1016/B978-0-44-318782-7.00013-7</idno>
		<imprint>
			<date type="published" when="2024">2024</date>
			<publisher>Academic Press</publisher>
			<biblScope unit="page" from="163" to="179" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Minimization of Bitsliced Representation of 4×4 S-Boxes based on Ternary Logic Instruction</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Sovyn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecom-munication Systems</title>
		<imprint>
			<biblScope unit="volume">3421</biblScope>
			<biblScope unit="page" from="12" to="24" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Implementation of S-box for Lightweight Block Cipher</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Changle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">P</forename><surname>Metkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Patole</surname></persName>
		</author>
		<idno type="DOI">10.1109/CONIT59222.2023.10205535</idno>
	</analytic>
	<monogr>
		<title level="m">3 rd International Conference on Intelligent Technologies</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A New Cost Function for Heuristic Search of Nonlinear Substitutions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.eswa.2023.121684</idno>
	</analytic>
	<monogr>
		<title level="j">Expert Syst. Appls</title>
		<imprint>
			<biblScope unit="volume">237</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Menezes</surname></persName>
		</author>
		<idno type="DOI">10.1201/9780429466335</idno>
		<imprint>
			<date type="published" when="2018">2018</date>
			<publisher>CRC Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Communication Theory of Secrecy Systems</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">E</forename><surname>Shannon</surname></persName>
		</author>
		<idno type="DOI">10.1002/j.1538-7305.1949.tb00928.x</idno>
	</analytic>
	<monogr>
		<title level="j">Bell Syst. Tech. J</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="656" to="715" />
			<date type="published" when="1949">1949</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Vectorial Boolean Functions for Cryptography, Boolean Models and Methods in Mathematics</title>
		<author>
			<persName><forename type="first">C</forename><surname>Carlet</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
		<respStmt>
			<orgName>Computer Science, and Engineering</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">An External Parameter Independent Novel Cost Function for Evolving Bijective Substitution-Boxes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Freyre-Echevarría</surname></persName>
		</author>
		<idno type="DOI">10.3390/sym12111896</idno>
	</analytic>
	<monogr>
		<title level="j">Symmetry</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page">1896</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A New Cost Function for Evolution of S-Boxes</title>
		<author>
			<persName><forename type="first">S</forename><surname>Picek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Cupic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Rotim</surname></persName>
		</author>
		<idno type="DOI">10.1162/EVCO_a_00191</idno>
	</analytic>
	<monogr>
		<title level="j">Evolut. Computation</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="695" to="718" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Álvarez-Cubero</surname></persName>
		</author>
		<idno type="DOI">10.13140/RG.2.2.12540.23685</idno>
		<title level="m">Vector Boolean Functions: Applications in Symmetric Cryptography</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Cryptographically Properties of Random S-Boxes</title>
		<author>
			<persName><forename type="first">K</forename><surname>Lisitskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Lisitska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">16 th International Conference on ICT in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer II</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2732</biblScope>
			<biblScope unit="page" from="228" to="241" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Random S-Boxes Generation Methods for Symmetric Cryptography</title>
		<author>
			<persName><forename type="first">I</forename><surname>Gorbenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/UKRCON.2019.8879962</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 2 nd Ukraine Conference on Electrical and Computer Engineering (UKRCON)</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="947" to="950" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Specification of Rijndael, The Design of Rijndael: The Advanced Encryption Standard</title>
		<author>
			<persName><forename type="first">J</forename><surname>Daemen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Rijmen</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-662-60769-5_3</idno>
		<imprint>
			<date type="published" when="2020">2020</date>
			<publisher>Springer</publisher>
			<biblScope unit="page" from="31" to="51" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">V</forename><surname>Bard</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-0-387-88757-9</idno>
		<title level="m">Algebraic Cryptanalysis</title>
				<imprint>
			<publisher>Springer US</publisher>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Algebraic Cryptanalysis of the Data Encryption Standard, Cryptography and Coding</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">T</forename><surname>Courtois</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">V</forename><surname>Bard</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-540-77272-9_10</idno>
	</analytic>
	<monogr>
		<title level="j">LNSC</title>
		<imprint>
			<biblScope unit="volume">4887</biblScope>
			<biblScope unit="page" from="152" to="169" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Cryptanalysis of Block Ciphers with Overdefined Systems of Equations</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">T</forename><surname>Courtois</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pieprzyk</surname></persName>
		</author>
		<idno type="DOI">10.1007/3-540-36178-2_17</idno>
	</analytic>
	<monogr>
		<title level="m">Advances in Cryptology-ASIACRYPT 2002</title>
				<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2501</biblScope>
			<biblScope unit="page" from="267" to="287" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity</title>
		<author>
			<persName><forename type="first">V</forename><surname>Buhas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">3188</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="273" to="281" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies</title>
		<author>
			<persName><forename type="first">V</forename><surname>Buriachok</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">2746</biblScope>
			<biblScope unit="page" from="23" to="32" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Stability Verification of Self-Organized Wireless Networks with Block Encryption</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Skladannyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hulak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">5 th International Workshop on Computer Modeling and Intelligent Systems</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">3137</biblScope>
			<biblScope unit="page" from="227" to="237" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Evolución Híbrida de S-cajas no Lineales Resistentes a Ataques de Potencia</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Freyre</forename><surname>Echevarría</surname></persName>
		</author>
		<idno type="DOI">10.13140/RG.2.2.17037.77284/1</idno>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Mclaughlin</surname></persName>
		</author>
		<ptr target="https://etheses.whiterose.ac.uk/3674/" />
		<title level="m">Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
		<respStmt>
			<orgName>PhD, University of York</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">Heuristic Optimization of Boolean Functions and Substitution Boxes for Cryptography</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">D</forename><surname>Burnett</surname></persName>
		</author>
		<ptr target="https://eprints.qut.edu.au/16023/" />
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
		<respStmt>
			<orgName>PhD, Queensland University of Technology</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">SBGen: A High-performance Library for Rapid Generation of Cryptographic Sboxes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.softx.2024.101788</idno>
	</analytic>
	<monogr>
		<title level="j">SoftwareX</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page">101788</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">The Design of Sboxes by Simulated Annealing</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Clark</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Jacob</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Stepney</surname></persName>
		</author>
		<idno type="DOI">10.1007/BF03037656</idno>
	</analytic>
	<monogr>
		<title level="j">New Gener. Comput</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="219" to="231" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Freyre</forename><surname>Echevarría</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">Martínez</forename><surname>Díaz</surname></persName>
		</author>
		<title level="m">A New Cost Function to Improve Nonlinearity of Bijective Sboxes</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography</title>
		<author>
			<persName><forename type="first">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.3390/cryptography8020017</idno>
	</analytic>
	<monogr>
		<title level="j">Cryptography</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page">17</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Enhancing Cryptographic Primitives through Dynamic Cost Function Optimization in Heuristic Search</title>
		<author>
			<persName><forename type="first">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.3390/electronics13101825</idno>
	</analytic>
	<monogr>
		<title level="j">Electronics</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page">1825</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Perfect Nonlinear S-boxes</title>
		<author>
			<persName><forename type="first">K</forename><surname>Nyberg</surname></persName>
		</author>
		<idno type="DOI">10.1007/3-540-46416-6_32</idno>
	</analytic>
	<monogr>
		<title level="m">Advances in Cryptology -EUROCRYPT &apos;91</title>
				<imprint>
			<date type="published" when="1991">1991</date>
			<biblScope unit="volume">547</biblScope>
			<biblScope unit="page" from="378" to="386" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Differentially uniform mappings for cryptography</title>
		<author>
			<persName><forename type="first">K</forename><surname>Nyberg</surname></persName>
		</author>
		<idno type="DOI">10.1007/3-540-48285-7_6</idno>
	</analytic>
	<monogr>
		<title level="m">Advances in Cryptology-EUROCRYPT &apos;93</title>
				<imprint>
			<date type="published" when="1994">1994</date>
			<biblScope unit="volume">765</biblScope>
			<biblScope unit="page" from="55" to="64" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Stream/Block Ciphers, Difference Equations and Algebraic Attacks</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">La</forename><surname>Scala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Tiwari</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jsc.2021.09.001</idno>
	</analytic>
	<monogr>
		<title level="j">J. Symbolic Comput</title>
		<imprint>
			<biblScope unit="volume">109</biblScope>
			<biblScope unit="page" from="177" to="198" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Designing Bijective S-boxes Using Algorithm Portfolios with Limited Time Budgets</title>
		<author>
			<persName><forename type="first">D</forename><surname>Souravlias</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Parsopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Meletiou</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.asoc.2017.05.052</idno>
	</analytic>
	<monogr>
		<title level="j">Appl. Soft Comput</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="page" from="475" to="486" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes, Information and Communication Security</title>
		<author>
			<persName><forename type="first">W</forename><surname>Millan</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-540-47942-0_22</idno>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">1726</biblScope>
			<biblScope unit="page" from="263" to="274" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Tesar</surname></persName>
		</author>
		<ptr target="http://dspace.lib.vutbr.cz/xmlui/handle/11012/56957" />
		<title level="m">A New Method for Generating High Nonlinearity S-Boxes</title>
				<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm, Cryptography and Information Security in the Balkans</title>
		<author>
			<persName><forename type="first">G</forename><surname>Ivanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Nikolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nikova</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-29172-7_3</idno>
	</analytic>
	<monogr>
		<title level="j">LNSC</title>
		<imprint>
			<biblScope unit="volume">9540</biblScope>
			<biblScope unit="page" from="31" to="42" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties</title>
		<author>
			<persName><forename type="first">G</forename><surname>Ivanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Nikolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nikova</surname></persName>
		</author>
		<idno type="DOI">10.1007/s12095-015-0170-5</idno>
	</analytic>
	<monogr>
		<title level="j">Cryptogr. Commun</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="247" to="276" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">Optimization of the High Nonlinear S-Boxes Generation Method</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rodinko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oliynykov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Gorbenko</surname></persName>
		</author>
		<idno type="DOI">10.1515/tmmp-2017-0020</idno>
	</analytic>
	<monogr>
		<title level="j">Tatra Mountains Math. Publ</title>
		<imprint>
			<biblScope unit="volume">70</biblScope>
			<biblScope unit="page" from="93" to="105" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">A New Post-Processing Approach for Improvement of Nonlinearity Property in Substitution Boxes</title>
		<author>
			<persName><forename type="first">F</forename><surname>Artuğer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Özkaynak</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.vlsi.2023.102105</idno>
	</analytic>
	<monogr>
		<title level="j">Integration</title>
		<imprint>
			<biblScope unit="volume">94</biblScope>
			<biblScope unit="page">102105</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Substitution Box Generator with Enhanced Cryptographic Properties and Minimal Computation Time</title>
		<author>
			<persName><forename type="first">T</forename><surname>Haider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Azam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Hayat</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.eswa.2023.122779</idno>
	</analytic>
	<monogr>
		<title level="j">Expert Syst. Appl</title>
		<imprint>
			<biblScope unit="volume">241</biblScope>
			<biblScope unit="page">122779</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Region of Interest-Based Medical Image Encryption Technique Based on Chaotic Sboxes</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Jamal</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.eswa.2023.122030</idno>
	</analytic>
	<monogr>
		<title level="j">Expert Syst. Appl</title>
		<imprint>
			<biblScope unit="volume">238</biblScope>
			<biblScope unit="page">122030</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">The Reality of Backdoored S-Boxes-An Eye Opener</title>
		<author>
			<persName><forename type="first">S</forename><surname>Fahd</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jisa.2023.103674</idno>
	</analytic>
	<monogr>
		<title level="j">J. Inf. Secur. Appls</title>
		<imprint>
			<biblScope unit="volume">80</biblScope>
			<biblScope unit="page">103674</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Ars</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-C</forename><surname>Faugère</surname></persName>
		</author>
		<ptr target="https://hal.inria.fr/inria-00070475" />
		<title level="m">Algebraic Immunities of Functions Over Finite Fields</title>
				<imprint>
			<publisher>INRIA</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">Algebraic Immunity of Non-linear Blocks of Symmetric Ciphers</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.1615/TelecomRadEng.v77.i4.30</idno>
	</analytic>
	<monogr>
		<title level="j">Telecommun. Radio Eng</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="page" from="309" to="325" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">Evaluation of Algebraic Immunity of modern block ciphers</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.1109/DESSERT.2018.8409146</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Int. Conf. Dependable Syst., Serv. Technol</title>
		<imprint>
			<biblScope unit="page" from="288" to="293" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Cryptographically Properties of Random S-boxes</title>
		<author>
			<persName><forename type="first">K</forename><surname>Lisitskiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Lisitska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICT in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2732</biblScope>
			<biblScope unit="page" from="228" to="241" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Random S-boxes Generation Methods for Symmetric Cryptography</title>
		<author>
			<persName><forename type="first">I</forename><surname>Gorbenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/ukrcon.2019.8879962</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 2 nd Ukraine Conference on Electrical and Computer Engineering</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="947" to="950" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Optimized Simulated Annealing for Efficient Generation of Highly Nonlinear S-boxes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.1007/s00500-023-09334-y</idno>
	</analytic>
	<monogr>
		<title level="j">Soft. Comput</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">Optimizing Hill Climbing Algorithm for S-Boxes Generation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.3390/electronics12102338</idno>
	</analytic>
	<monogr>
		<title level="j">Electronics</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page">2338</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">Evolving Nonlinear S-Boxes With Improved Theoretical Resilience to Power Attacks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Freyre-Echevarría</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2020.3035163</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="202728" to="202737" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">Utilizing Evolutionary Computation Methods for the Design of S-Boxes</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">C</forename><surname>Laskari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">C</forename><surname>Meletiou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">N</forename><surname>Vrahatis</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICCIAS.2006.295267</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Computational Intelligence and Security</title>
				<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="1299" to="1302" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">Chapter 6-Natureinspired Optimization Algorithms</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ghosh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Saha</surname></persName>
		</author>
		<idno type="DOI">10.1016/B978-0-443-15395-2.00002-8</idno>
	</analytic>
	<monogr>
		<title level="m">Artificial Intelligence in Textile Engineering</title>
				<imprint>
			<publisher>Woodhead Publishing</publisher>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="171" to="231" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<monogr>
		<title level="m" type="main">Chapter Seven-Genetic algorithm, Handbook of Metaheuristic Algorithms</title>
		<author>
			<persName><forename type="first">C.-W</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M.-C</forename><surname>Chiang</surname></persName>
		</author>
		<idno type="DOI">10.1016/B978-0-44-319108-4.00020-4</idno>
		<imprint>
			<date type="published" when="2023">2023</date>
			<publisher>Academic Press</publisher>
			<biblScope unit="page" from="111" to="138" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b53">
	<analytic>
		<title level="a" type="main">Application of Genetic Algorithms in the Construction of Invertible Substitution Boxes</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kapuściński</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Nowicki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Napoli</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-39378-0_33</idno>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence and Soft Computing</title>
		<imprint>
			<biblScope unit="volume">9692</biblScope>
			<biblScope unit="page" from="380" to="391" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note>LNAI</note>
</biblStruct>

<biblStruct xml:id="b54">
	<analytic>
		<title level="a" type="main">Chapter Sixteen-Local Search Algorithm</title>
		<author>
			<persName><forename type="first">C.-W</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M.-C</forename><surname>Chiang</surname></persName>
		</author>
		<idno type="DOI">10.1016/B978-0-44-319108-4.00030-7</idno>
	</analytic>
	<monogr>
		<title level="m">Handbook of Metaheuristic Algorithms</title>
				<imprint>
			<publisher>Academic Press</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="351" to="374" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b55">
	<analytic>
		<title level="a" type="main">WHS Cost Function for Generating S-boxes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.1109/PICST54195.2021.9772133</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 8 th International Conference on Problems of Infocommunications</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="434" to="438" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b56">
	<analytic>
		<title level="a" type="main">Opportunities to Minimize Hardware and Software Costs for Implementing Boolean Functions in Stream Ciphers</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Comput</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="443" to="452" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b57">
	<analytic>
		<title level="a" type="main">Optimization of a Simulated Annealing Algorithm for S-Boxes Generating</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.3390/s22166073</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="page">6073</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b58">
	<analytic>
		<title level="a" type="main">Generation of Nonlinear Substitutions by Simulated Annealing Algorithm</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.3390/info14050259</idno>
	</analytic>
	<monogr>
		<title level="j">Inf</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page">259</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
