{"id":"https://openalex.org/W1598916050","doi":"https://doi.org/10.1007/978-3-540-68351-3_16","title":"The Self-synchronizing Stream Cipher Moustique","display_name":"The Self-synchronizing Stream Cipher Moustique","publication_year":2008,"publication_date":"2008-08-12","ids":{"openalex":"https://openalex.org/W1598916050","doi":"https://doi.org/10.1007/978-3-540-68351-3_16","mag":"1598916050"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-68351-3_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-68351-3_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055847285","display_name":"Joan Daemen","orcid":"https://orcid.org/0000-0002-4102-0775"},"institutions":[{"id":"https://openalex.org/I4210117275","display_name":"STMicroelectronics (Belgium)","ror":"https://ror.org/02km85a12","country_code":"BE","type":"company","lineage":["https://openalex.org/I131827901","https://openalex.org/I4210117275"]},{"id":"https://openalex.org/I131827901","display_name":"STMicroelectronics (Switzerland)","ror":"https://ror.org/00wm3b005","country_code":"CH","type":"company","lineage":["https://openalex.org/I131827901"]}],"countries":["BE","CH"],"is_corresponding":true,"raw_author_name":"Joan Daemen","raw_affiliation_strings":["STMicroelectronics, Belgium","STMicroelectronics, Belgium#TAB#"],"affiliations":[{"raw_affiliation_string":"STMicroelectronics, Belgium","institution_ids":["https://openalex.org/I4210117275"]},{"raw_affiliation_string":"STMicroelectronics, Belgium#TAB#","institution_ids":["https://openalex.org/I131827901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082037558","display_name":"Paris Kitsos","orcid":"https://orcid.org/0000-0003-1851-8775"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]},{"id":"https://openalex.org/I231025917","display_name":"Hellenic Open University","ror":"https://ror.org/02kq26x23","country_code":"GR","type":"education","lineage":["https://openalex.org/I231025917"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Paris Kitsos","raw_affiliation_strings":["Hellenic Open University, Patras, Greece and Dept. of Computer Science and Technology, University of the Peloponnese, Tripoli, Greece","Hellenic Open University, Patras, Greece and Dept. of Computer Science and Technology, University of the Peloponnese, Tripoli, Greece#TAB#"],"affiliations":[{"raw_affiliation_string":"Hellenic Open University, Patras, Greece and Dept. of Computer Science and Technology, University of the Peloponnese, Tripoli, Greece","institution_ids":["https://openalex.org/I231025917"]},{"raw_affiliation_string":"Hellenic Open University, Patras, Greece and Dept. of Computer Science and Technology, University of the Peloponnese, Tripoli, Greece#TAB#","institution_ids":["https://openalex.org/I158716096"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055847285"],"corresponding_institution_ids":["https://openalex.org/I131827901","https://openalex.org/I4210117275"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.7884,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.91259259,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"210","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.826999306678772},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8187060356140137},{"id":"https://openalex.org/keywords/synchronizing","display_name":"Synchronizing","score":0.7910213470458984},{"id":"https://openalex.org/keywords/stream-cipher-attack","display_name":"Stream cipher attack","score":0.723878026008606},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.6759158372879028},{"id":"https://openalex.org/keywords/two-square-cipher","display_name":"Two-square cipher","score":0.5871654152870178},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5724520087242126},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.5036675333976746},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4823000431060791},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4150208830833435},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.4094898998737335},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3694446086883545},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3004632592201233},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2538767457008362},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10666289925575256},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07311275601387024}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.826999306678772},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8187060356140137},{"id":"https://openalex.org/C162932704","wikidata":"https://www.wikidata.org/wiki/Q1058791","display_name":"Synchronizing","level":3,"score":0.7910213470458984},{"id":"https://openalex.org/C96675983","wikidata":"https://www.wikidata.org/wiki/Q7622661","display_name":"Stream cipher attack","level":4,"score":0.723878026008606},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.6759158372879028},{"id":"https://openalex.org/C60153865","wikidata":"https://www.wikidata.org/wiki/Q1124307","display_name":"Two-square cipher","level":5,"score":0.5871654152870178},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5724520087242126},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.5036675333976746},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4823000431060791},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4150208830833435},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.4094898998737335},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3694446086883545},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3004632592201233},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2538767457008362},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10666289925575256},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07311275601387024},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-68351-3_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-68351-3_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","score":0.8199999928474426,"display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W186919122","https://openalex.org/W1479757466","https://openalex.org/W1533793622","https://openalex.org/W1583126123","https://openalex.org/W1654475571","https://openalex.org/W2495889793","https://openalex.org/W2498149115"],"related_works":["https://openalex.org/W2390578388","https://openalex.org/W2031363905","https://openalex.org/W2357387812","https://openalex.org/W2020890044","https://openalex.org/W186919122","https://openalex.org/W2950447949","https://openalex.org/W1489350638","https://openalex.org/W1977995103","https://openalex.org/W2133254303","https://openalex.org/W3125259055"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
