Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,394,673 papers from all fields of science
Search
Sign In
Create Free Account
Permutation box
Known as:
Controlled permutation box
, P Box
In cryptography, a permutation box (or P-box) is a method of bit-shuffling used to permute or transpose bits across S-boxes inputs, retaining…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Block cipher
Ciphertext
Confusion and diffusion
Cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A Novel Parallel Image Encryption Scheme Using Chaos
Chong Fu
,
G. Zhang
,
Mai Zhu
,
Li-ying Cong
,
W. Lei
IEEE International Symposium on Parallel and…
2017
Corpus ID: 44123167
In recent years, chaos-based image cipher has been widely studied and a growing number of schemes based on permutation…
Expand
2014
2014
The P-Box CDF-Intervals: A Reliable Constraint Reasoning with Quantifiable Information
Aya Saad
,
Thom W. Frühwirth
,
C. Gervet
Theory and Practice of Logic Programming
2014
Corpus ID: 10143426
Abstract This paper introduces a new constraint domain for reasoning about data with uncertainty. It extends convex modeling with…
Expand
2014
2014
Kolmogorov-Smirnov Test for Interval Data
Sébastien Destercke
,
O. Strauss
International Conference on Information…
2014
Corpus ID: 9070051
In this paper, we are interested in extending the classical Kolmogorov-Smirnov homogeneity test to compare two samples of…
Expand
2014
2014
An image encryption using chaotic permutation and diffusion
T. Gopalakrishnan
,
S. Ramakrishnan
,
M. Balakumar
International Conference on Recent Trends in…
2014
Corpus ID: 14406002
This paper proposes a chaos-based image encryption scheme with a permutation-diffusion structure. In this method the encryption…
Expand
2013
2013
Key based S-box selection and key expansion algorithm for substitution-permutation network cryptography
Raja Jitendra Nayaka
,
R. Biradar
Energy
2013
Corpus ID: 21273482
Key dependent block cipher algorithms have been designed and implemented by researchers. However, the performance in terms of…
Expand
2013
2013
A chaotic symmetric image cipher using a pixel-swapping based permutation
Chong Fu
,
Guo-yu Zhao
,
Meng Gao
,
Hong-feng Ma
IEEE Region 10 Conference
2013
Corpus ID: 24567399
Chaos-based image cipher has been extensively investigated over the last two decades or so to meet the increasing demand for…
Expand
2011
2011
Block cipher design: Generalized single-use-algorithm based on chaos
Geng Zhao
,
Guanrong Chen
,
Jingqing Fang
,
Gang Xu
2011
Corpus ID: 62153106
2011
2011
Verified Solution and Propagation of Uncertainty in Physiological Models
Joshua A. Enszer
,
M. Stadtherr
Reliable Computing
2011
Corpus ID: 13964314
We demonstrate here a method for the veri(cid:12)ed solution of nonlinear ODE models in physiology, computing rigorous bounds on…
Expand
2006
2006
A Unified View of Some Representations of Imprecise Probabilities
Sébastien Destercke
,
D. Dubois
International Conference on Soft Methods in…
2006
Corpus ID: 1939838
Summary. Several methods for the practical representation of imprecise probabilities exist such as Ferson’s p-boxes, possibility…
Expand
1983
1983
The design of complete encryption networks using cryptographically equivalent permutations
F. Ayoub
Computers & security
1983
Corpus ID: 8702099
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE