Table 9 Input/output XOR distribution table of created S-box.
From: A study of text-theoretical approach to S-box construction with image encryption applications
6 | 8 | 6 | 8 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 4 | 8 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
6 | 6 | 6 | 6 | 8 | 10 | 6 | 10 | 6 | 8 | 4 | 6 | 6 | 10 | 6 | 6 |
6 | 4 | 6 | 6 | 6 | 6 | 8 | 6 | 8 | 8 | 6 | 6 | 6 | 6 | 8 | 8 |
6 | 8 | 8 | 6 | 6 | 6 | 6 | 4 | 8 | 6 | 8 | 6 | 8 | 6 | 8 | 6 |
8 | 6 | 10 | 6 | 6 | 6 | 6 | 8 | 6 | 8 | 6 | 6 | 6 | 6 | 8 | 8 |
8 | 8 | 8 | 6 | 6 | 10 | 6 | 6 | 8 | 8 | 6 | 6 | 10 | 10 | 6 | 8 |
8 | 6 | 6 | 6 | 6 | 8 | 6 | 8 | 6 | 6 | 6 | 6 | 6 | 8 | 8 | 6 |
6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 8 | 8 | 6 | 8 | 8 | 6 |
6 | 6 | 6 | 8 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 10 | 6 | 6 | 6 |
6 | 6 | 6 | 6 | 6 | 6 | 8 | 8 | 6 | 8 | 6 | 6 | 6 | 10 | 8 | 8 |
6 | 6 | 6 | 8 | 6 | 6 | 6 | 6 | 8 | 10 | 6 | 6 | 6 | 8 | 4 | 6 |
8 | 6 | 6 | 6 | 6 | 6 | 6 | 10 | 8 | 8 | 8 | 10 | 6 | 6 | 8 | 6 |
6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 6 | 8 | 8 | 6 | 6 |
8 | 8 | 6 | 8 | 8 | 6 | 6 | 6 | 6 | 6 | 8 | 6 | 6 | 6 | 8 | 6 |
6 | 8 | 6 | 6 | 8 | 8 | 8 | 8 | 6 | 8 | 8 | 6 | 8 | 6 | 8 | 6 |
6 | 8 | 6 | 6 | 8 | 6 | 6 | 6 | 6 | 6 | 10 | 8 | 6 | 6 | 8 | 0 |