{"id":"https://openalex.org/W2000599680","doi":"https://doi.org/10.1007/s00607-009-0035-x","title":"An approach for stream ciphers design based on joint computing over random and secret data","display_name":"An approach for stream ciphers design based on joint computing over random and secret data","publication_year":2009,"publication_date":"2009-05-06","ids":{"openalex":"https://openalex.org/W2000599680","doi":"https://doi.org/10.1007/s00607-009-0035-x","mag":"2000599680"},"language":"en","primary_location":{"id":"doi:10.1007/s00607-009-0035-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00607-009-0035-x","pdf_url":null,"source":{"id":"https://openalex.org/S35593046","display_name":"Computing","issn_l":"0010-485X","issn":["0010-485X","1436-5057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020416375","display_name":"Miodrag J. Mihaljevi\u0107","orcid":null},"institutions":[{"id":"https://openalex.org/I1338511612","display_name":"Serbian Academy of Sciences and Arts","ror":"https://ror.org/05m1y4204","country_code":"RS","type":"funder","lineage":["https://openalex.org/I1338511612"]},{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP","RS"],"is_corresponding":true,"raw_author_name":"Miodrag J. Mihaljevi\u0107","raw_affiliation_strings":["Mathematical Institute, Serbian Academy of Science and Arts, Kneza Mihaila 35, Belgrade, Serbia","Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Room 1003, Akihabara Daibiru, 1-18-13, Sotokanda, Chiyoda-ku, Tokyo, 101-0021, Japan"],"affiliations":[{"raw_affiliation_string":"Mathematical Institute, Serbian Academy of Science and Arts, Kneza Mihaila 35, Belgrade, Serbia","institution_ids":["https://openalex.org/I1338511612"]},{"raw_affiliation_string":"Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Room 1003, Akihabara Daibiru, 1-18-13, Sotokanda, Chiyoda-ku, Tokyo, 101-0021, Japan","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102059792","display_name":"Hideki Imai","orcid":null},"institutions":[{"id":"https://openalex.org/I96679780","display_name":"Chuo University","ror":"https://ror.org/03qvqb743","country_code":"JP","type":"education","lineage":["https://openalex.org/I96679780"]},{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideki Imai","raw_affiliation_strings":["Faculty of Sciences and Engineering, Chuo University, 1-13-27, Kasuga, Bunkyo-ku, Tokyo, 112-8551, Japan","Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Room 1003, Akihabara Daibiru, 1-18-13, Sotokanda, Chiyoda-ku, Tokyo, 101-0021, Japan"],"affiliations":[{"raw_affiliation_string":"Faculty of Sciences and Engineering, Chuo University, 1-13-27, Kasuga, Bunkyo-ku, Tokyo, 112-8551, Japan","institution_ids":["https://openalex.org/I96679780"]},{"raw_affiliation_string":"Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Room 1003, Akihabara Daibiru, 1-18-13, Sotokanda, Chiyoda-ku, Tokyo, 101-0021, Japan","institution_ids":["https://openalex.org/I73613424"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020416375"],"corresponding_institution_ids":["https://openalex.org/I1338511612","https://openalex.org/I73613424"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":3.0397,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.91065423,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"85","issue":"1-2","first_page":"153","last_page":"168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.7194188833236694},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6986943483352661},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5855960249900818},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5399280786514282},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5305882692337036},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5022165775299072},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49878454208374023},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4706506133079529},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.44859185814857483},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.43496912717819214},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.4333771765232086},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.40457314252853394},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3635003864765167},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.35641515254974365},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.32000353932380676},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2676842212677002},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1735955774784088},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1548672616481781}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.7194188833236694},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6986943483352661},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5855960249900818},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5399280786514282},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5305882692337036},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5022165775299072},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49878454208374023},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4706506133079529},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.44859185814857483},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.43496912717819214},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.4333771765232086},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40457314252853394},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3635003864765167},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.35641515254974365},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.32000353932380676},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2676842212677002},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1735955774784088},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1548672616481781}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s00607-009-0035-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00607-009-0035-x","pdf_url":null,"source":{"id":"https://openalex.org/S35593046","display_name":"Computing","issn_l":"0010-485X","issn":["0010-485X","1436-5057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4300000071525574,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1489829676","https://openalex.org/W1511014813","https://openalex.org/W1517036210","https://openalex.org/W1529679142","https://openalex.org/W1544773214","https://openalex.org/W1572614022","https://openalex.org/W1589129743","https://openalex.org/W1856342626","https://openalex.org/W1916486734","https://openalex.org/W1985385793","https://openalex.org/W2012646342","https://openalex.org/W2029226988","https://openalex.org/W2043769961","https://openalex.org/W2112512647","https://openalex.org/W2121937998","https://openalex.org/W2130943734","https://openalex.org/W2146436730","https://openalex.org/W2150361476","https://openalex.org/W2398026502","https://openalex.org/W2986959318"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W114534093","https://openalex.org/W1890290077","https://openalex.org/W2156908834","https://openalex.org/W1906282778","https://openalex.org/W2383331906","https://openalex.org/W2298331565","https://openalex.org/W2134038088","https://openalex.org/W2071636004","https://openalex.org/W3109578261"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
