Skip to main content

Table 6 \( \hat{\mathbb{C}}\left(x\left)\right(i,j\right)\in {\left({\left[0,60\right]}^{2\times 3}\right)}^X \)

From: Optimal alternative for suitability of S-boxes to image encryption based on m-polar fuzzy soft set decision-making criterion

\( \hat{\mathbb{C}} \)\( \hat{\mathbb{C}}\left({x}_1\right) \)\( \hat{\mathbb{C}}\left({x}_2\right) \)\( \hat{\mathbb{C}}\left({x}_3\right) \)\( \hat{\mathbb{C}}\left({x}_4\right) \)\( \hat{\mathbb{C}}\left({x}_5\right) \)
(i1, j1)6060606060
(i1, j2)0.13680.0196606060
(i1, j3)6060606060
(i2, j1)0.15760.034080.08920.06320.083
(i2, j2)0.11680.01960.00320.02450.0022
(i2, j3)0.15760.117360.08920.06320.083
(i3, j1)6060606060
(i3, j2)0.13680.01960.00440.02450.0224
(i3, j3)6060606060