• Ali S, Alali A, Khan A, Wijayanti I and Wong K. (2024). XOR count and block circulant MDS matrices over finite commutative rings. AIMS Mathematics. 10.3934/math.20241474. 9:11. (30529-30547).

    http://www.aimspress.com/article/doi/10.3934/math.20241474

  • Bahaddad A, Asif M, Ashraf U, Asiri Y and Alkhalaf S. (2024). The security of text data based on cyclic codes over algebraic structure. Thermal Science. 10.2298/TSCI2406205B. 28:6 Part B. (5205-5215).

    https://doiserbia.nb.rs/Article.aspx?ID=0354-98362406205B

  • Wang S, Chen Y, Li Y and Zeng X. (2022). On construction of lightweight MDS matrices. Advances in Mathematics of Communications. 10.3934/amc.2022094. 0:0. (0-0).

    https://www.aimsciences.org//article/doi/10.3934/amc.2022094

  • Bhade N, Kishan M, Sankar A and Shruthi S. (2021). Latin Square Image Cipher for Medical Images 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS). 10.1109/CSITSS54238.2021.9683782. 978-1-6654-0610-9. (1-9).

    https://ieeexplore.ieee.org/document/9683782/

  • Khan N, Altaf M and Khan F. (2020). Selective encryption of JPEG images with chaotic based novel S-box. Multimedia Tools and Applications. 10.1007/s11042-020-10110-5.

    http://link.springer.com/10.1007/s11042-020-10110-5

  • Sakalauskas E, Dindienė L, Kilčiauskas A and Lukšys K. (2020). Perfectly Secure Shannon Cipher Construction Based on the Matrix Power Function. Symmetry. 10.3390/sym12050860. 12:5. (860).

    https://www.mdpi.com/2073-8994/12/5/860

  • Dragomir I, Malutan S and Lazar M. (2019). An analysis of cryptographic algorithm strength based on S-box properties 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). 10.1109/ECAI46879.2019.9042161. 978-1-7281-1624-2. (1-4).

    https://ieeexplore.ieee.org/document/9042161/

  • Luong T. (2016). Effective Linear Transformation Matrices for Block Cipher Based on Bi-regular Matrix. Recent Advances in Information and Communication Technology 2016. 10.1007/978-3-319-40415-8_23. (233-243).

    http://link.springer.com/10.1007/978-3-319-40415-8_23

  • (2015). References. Applied Cryptography, Second Edition. 10.1002/9781119183471.refs. (675-741). Online publication date: 6-Oct-2015.

    https://onlinelibrary.wiley.com/doi/10.1002/9781119183471.refs

  • Gupta K and Ray I. (2013). On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography. Security Engineering and Intelligence Informatics. 10.1007/978-3-642-40588-4_3. (29-43).

    http://link.springer.com/10.1007/978-3-642-40588-4_3

  • Rwabutaza A, Yang M and Bourbakis N. A Comparative Survey on Cryptology-Based Methodologies. International Journal of Information Security and Privacy. 10.4018/jisp.2012070101. 6:3. (1-37).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jisp.2012070101

  • Han H, Zhang H, Li Q and Tong Y. (2010). Generation algorithm of a sort of P-permutations. Wuhan University Journal of Natural Sciences. 10.1007/s11859-010-0311-9. 15:3. (237-241). Online publication date: 1-Jun-2010.

    http://link.springer.com/10.1007/s11859-010-0311-9

  • Han H and Zhang H. (2010). The Research on the Maximum Branch Number of P-Permutations 2010 2nd International Workshop on Intelligent Systems and Applications (ISA). 10.1109/IWISA.2010.5473354. 978-1-4244-5872-1. (1-4).

    http://ieeexplore.ieee.org/document/5473354/

  • Vaudenay S. (2018). Decorrelation. Journal of Cryptology. 16:4. (249-286). Online publication date: 1-Sep-2003.

    https://doi.org/10.1007/s00145-003-0220-6

  • Vaudenay S. (1999). On the Security of CS-Cipher. Fast Software Encryption. 10.1007/3-540-48519-8_19. (260-274).

    http://link.springer.com/10.1007/3-540-48519-8_19

  • Adams C. (1997). Constructing Symmetric Ciphers Using the CAST Design Procedure. Selected Areas in Cryptography. 10.1007/978-1-4615-5489-9_6. (71-104).

    http://link.springer.com/10.1007/978-1-4615-5489-9_6

  • Nyberg K. (1995). S-boxes and round functions with controllable linearity and differential uniformity. Fast Software Encryption. 10.1007/3-540-60590-8_9. (111-130).

    http://link.springer.com/10.1007/3-540-60590-8_9