{"id":"https://openalex.org/W1604195360","doi":"https://doi.org/10.1007/978-3-642-16342-5_16","title":"Proposition of Two Cipher Structures","display_name":"Proposition of Two Cipher Structures","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1604195360","doi":"https://doi.org/10.1007/978-3-642-16342-5_16","mag":"1604195360"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-16342-5_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-16342-5_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100616189","display_name":"Lei Zhang","orcid":"https://orcid.org/0000-0002-2839-8693"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lei Zhang","raw_affiliation_strings":["State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, P.R. China","State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100749307","display_name":"Liting Zhang","orcid":"https://orcid.org/0000-0002-3494-462X"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liting Zhang","raw_affiliation_strings":["State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, P.R. China","State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100616189"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210165038"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.2832,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57356207,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"215","last_page":"229"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8167393803596497},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7913631200790405},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.6449541449546814},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.5289236307144165},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.48561349511146545},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44609007239341736},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4153883457183838},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3781067132949829},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3623802065849304},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22199881076812744},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2055666148662567}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8167393803596497},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7913631200790405},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.6449541449546814},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.5289236307144165},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.48561349511146545},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44609007239341736},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4153883457183838},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3781067132949829},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3623802065849304},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22199881076812744},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2055666148662567},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-16342-5_16","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-16342-5_16","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1497721867","https://openalex.org/W1541703086","https://openalex.org/W1554865288","https://openalex.org/W1555570710","https://openalex.org/W1556212265","https://openalex.org/W1569252980","https://openalex.org/W1575149347","https://openalex.org/W1597699498","https://openalex.org/W1629301835","https://openalex.org/W1775533058","https://openalex.org/W1784406605","https://openalex.org/W1964723977","https://openalex.org/W2066464272","https://openalex.org/W2476012767","https://openalex.org/W2482045774","https://openalex.org/W2484860292","https://openalex.org/W2494421621","https://openalex.org/W2495889793","https://openalex.org/W2502046340","https://openalex.org/W2619380141","https://openalex.org/W4241072010"],"related_works":["https://openalex.org/W2950447949","https://openalex.org/W3159283027","https://openalex.org/W1784733384","https://openalex.org/W2615464719","https://openalex.org/W2157451614","https://openalex.org/W2483202600","https://openalex.org/W2903451324","https://openalex.org/W2391794278","https://openalex.org/W571790067","https://openalex.org/W24612159"],"abstract_inverted_index":null,"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
