{"id":"https://openalex.org/W4288070990","doi":"https://doi.org/10.1007/s11704-021-0550-2","title":"Further study on indecomposable cryptographic functions","display_name":"Further study on indecomposable cryptographic functions","publication_year":2022,"publication_date":"2022-07-27","ids":{"openalex":"https://openalex.org/W4288070990","doi":"https://doi.org/10.1007/s11704-021-0550-2"},"language":"en","primary_location":{"id":"doi:10.1007/s11704-021-0550-2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11704-021-0550-2","pdf_url":null,"source":{"id":"https://openalex.org/S4210231404","display_name":"Frontiers of Computer Science","issn_l":"2095-2228","issn":["2095-2228","2095-2236"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311889","host_organization_name":"Higher Education Press","host_organization_lineage":["https://openalex.org/P4310311889"],"host_organization_lineage_names":["Higher Education Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101553377","display_name":"Zhongqiu Wang","orcid":"https://orcid.org/0000-0003-2616-505X"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I25757504","display_name":"China University of Mining and Technology","ror":"https://ror.org/01xt2dr21","country_code":"CN","type":"education","lineage":["https://openalex.org/I25757504"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhongqiu Wang","raw_affiliation_strings":["Mine Digitization Engineering Research Center of Ministry of Education, China University of Mining and Technology, Xuzhou, 221116, China","Research Center of Innovation on Intelligent Prevention of Disaster and Emergency Rescure, China University of Mining and Technology, Xuzhou, 221116, China","School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, 221116, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China"],"affiliations":[{"raw_affiliation_string":"Mine Digitization Engineering Research Center of Ministry of Education, China University of Mining and Technology, Xuzhou, 221116, China","institution_ids":["https://openalex.org/I25757504"]},{"raw_affiliation_string":"Research Center of Innovation on Intelligent Prevention of Disaster and Emergency Rescure, China University of Mining and Technology, Xuzhou, 221116, China","institution_ids":["https://openalex.org/I25757504"]},{"raw_affiliation_string":"School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, 221116, China","institution_ids":["https://openalex.org/I25757504"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102732396","display_name":"Shixiong Xia","orcid":"https://orcid.org/0000-0002-3952-0877"},"institutions":[{"id":"https://openalex.org/I25757504","display_name":"China University of Mining and Technology","ror":"https://ror.org/01xt2dr21","country_code":"CN","type":"education","lineage":["https://openalex.org/I25757504"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shixiong Xia","raw_affiliation_strings":["Mine Digitization Engineering Research Center of Ministry of Education, China University of Mining and Technology, Xuzhou, 221116, China","School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, 221116, China"],"affiliations":[{"raw_affiliation_string":"Mine Digitization Engineering Research Center of Ministry of Education, China University of Mining and Technology, Xuzhou, 221116, China","institution_ids":["https://openalex.org/I25757504"]},{"raw_affiliation_string":"School of Computer Science and Technology, China University of Mining and Technology, Xuzhou, 221116, China","institution_ids":["https://openalex.org/I25757504"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056616258","display_name":"Fengrong Zhang","orcid":"https://orcid.org/0000-0002-6804-6975"},"institutions":[{"id":"https://openalex.org/I25757504","display_name":"China University of Mining and Technology","ror":"https://ror.org/01xt2dr21","country_code":"CN","type":"education","lineage":["https://openalex.org/I25757504"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengrong Zhang","raw_affiliation_strings":["Mine Digitization Engineering Research Center of Ministry of Education, China University of Mining and Technology, Xuzhou, 221116, China","Research Center of Innovation on Intelligent Prevention of Disaster and Emergency Rescure, China University of Mining and Technology, Xuzhou, 221116, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China"],"affiliations":[{"raw_affiliation_string":"Mine Digitization Engineering Research Center of Ministry of Education, China University of Mining and Technology, Xuzhou, 221116, China","institution_ids":["https://openalex.org/I25757504"]},{"raw_affiliation_string":"Research Center of Innovation on Intelligent Prevention of Disaster and Emergency Rescure, China University of Mining and Technology, Xuzhou, 221116, China","institution_ids":["https://openalex.org/I25757504"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101553377"],"corresponding_institution_ids":["https://openalex.org/I25757504","https://openalex.org/I4210132990"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.1379,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53741139,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"17","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/indecomposable-module","display_name":"Indecomposable module","score":0.9364451169967651},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7433883547782898},{"id":"https://openalex.org/keywords/decomposition","display_name":"Decomposition","score":0.7177707552909851},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.681316077709198},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6521371603012085},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5017132759094238},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4514828622341156},{"id":"https://openalex.org/keywords/functional-decomposition","display_name":"Functional decomposition","score":0.4190806448459625},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3039744794368744},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.30095839500427246},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.26079869270324707},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.1968948245048523},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.045654296875}],"concepts":[{"id":"https://openalex.org/C157480366","wikidata":"https://www.wikidata.org/wiki/Q2499534","display_name":"Indecomposable module","level":2,"score":0.9364451169967651},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7433883547782898},{"id":"https://openalex.org/C124681953","wikidata":"https://www.wikidata.org/wiki/Q339062","display_name":"Decomposition","level":2,"score":0.7177707552909851},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.681316077709198},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6521371603012085},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5017132759094238},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4514828622341156},{"id":"https://openalex.org/C12145135","wikidata":"https://www.wikidata.org/wiki/Q5215396","display_name":"Functional decomposition","level":2,"score":0.4190806448459625},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3039744794368744},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.30095839500427246},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.26079869270324707},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.1968948245048523},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.045654296875},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11704-021-0550-2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11704-021-0550-2","pdf_url":null,"source":{"id":"https://openalex.org/S4210231404","display_name":"Frontiers of Computer Science","issn_l":"2095-2228","issn":["2095-2228","2095-2236"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311889","host_organization_name":"Higher Education Press","host_organization_lineage":["https://openalex.org/P4310311889"],"host_organization_lineage_names":["Higher Education Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1606480398","https://openalex.org/W1629301835","https://openalex.org/W1967942908","https://openalex.org/W2090432705","https://openalex.org/W2139312425","https://openalex.org/W2528819694","https://openalex.org/W2792174692","https://openalex.org/W3210518152"],"related_works":["https://openalex.org/W2096895821","https://openalex.org/W18954787","https://openalex.org/W4390188610","https://openalex.org/W3138083505","https://openalex.org/W4254460476","https://openalex.org/W2783353176","https://openalex.org/W4390962791","https://openalex.org/W2339543721","https://openalex.org/W1829339118","https://openalex.org/W3179891621"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
