{"id":"https://openalex.org/W3183313386","doi":"https://doi.org/10.1007/s10207-022-00597-4","title":"ANS-based compression and encryption with 128-bit security","display_name":"ANS-based compression and encryption with 128-bit security","publication_year":2022,"publication_date":"2022-07-13","ids":{"openalex":"https://openalex.org/W3183313386","doi":"https://doi.org/10.1007/s10207-022-00597-4","mag":"3183313386"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-022-00597-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-022-00597-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00597-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00597-4.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084022157","display_name":"Seyit Camtepe","orcid":"https://orcid.org/0000-0001-6353-8359"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Seyit Camtepe","raw_affiliation_strings":["Data61, CSIRO, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109420627","display_name":"Jarek Duda","orcid":null},"institutions":[{"id":"https://openalex.org/I126596746","display_name":"Jagiellonian University","ror":"https://ror.org/03bqmcz70","country_code":"PL","type":"education","lineage":["https://openalex.org/I126596746"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Jarek Duda","raw_affiliation_strings":["Jagiellonian University, Cracow, Poland"],"affiliations":[{"raw_affiliation_string":"Jagiellonian University, Cracow, Poland","institution_ids":["https://openalex.org/I126596746"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021725402","display_name":"Arash Mahboubi","orcid":"https://orcid.org/0000-0002-0487-0615"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Arash Mahboubi","raw_affiliation_strings":["School of Computing and Mathematics, Charles Sturt University Port Macquarie, Port Macquarie, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Mathematics, Charles Sturt University Port Macquarie, Port Macquarie, Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005443087","display_name":"Pawe\u0142 Morawiecki","orcid":"https://orcid.org/0000-0003-3349-8645"},"institutions":[{"id":"https://openalex.org/I99542240","display_name":"Polish Academy of Sciences","ror":"https://ror.org/01dr6c206","country_code":"PL","type":"funder","lineage":["https://openalex.org/I99542240"]},{"id":"https://openalex.org/I4210087266","display_name":"Institute of Computer Science","ror":"https://ror.org/003fvp964","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210087266","https://openalex.org/I99542240"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Pawe\u0142 Morawiecki","raw_affiliation_strings":["Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland","institution_ids":["https://openalex.org/I99542240","https://openalex.org/I4210087266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["Data61, CSIRO, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075545991","display_name":"Marcin Paw\u0142owski","orcid":"https://orcid.org/0000-0002-5145-9220"},"institutions":[{"id":"https://openalex.org/I4210087266","display_name":"Institute of Computer Science","ror":"https://ror.org/003fvp964","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210087266","https://openalex.org/I99542240"]},{"id":"https://openalex.org/I99542240","display_name":"Polish Academy of Sciences","ror":"https://ror.org/01dr6c206","country_code":"PL","type":"funder","lineage":["https://openalex.org/I99542240"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Marcin Paw\u0142owski","raw_affiliation_strings":["Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland","institution_ids":["https://openalex.org/I99542240","https://openalex.org/I4210087266"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045977578","display_name":"Josef Pieprzyk","orcid":"https://orcid.org/0000-0002-1917-6466"},"institutions":[{"id":"https://openalex.org/I99542240","display_name":"Polish Academy of Sciences","ror":"https://ror.org/01dr6c206","country_code":"PL","type":"funder","lineage":["https://openalex.org/I99542240"]},{"id":"https://openalex.org/I4210087266","display_name":"Institute of Computer Science","ror":"https://ror.org/003fvp964","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210087266","https://openalex.org/I99542240"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU","PL"],"is_corresponding":false,"raw_author_name":"Josef Pieprzyk","raw_affiliation_strings":["Data61, CSIRO, Sydney, Australia","Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland","institution_ids":["https://openalex.org/I99542240","https://openalex.org/I4210087266"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5084022157"],"corresponding_institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I42894916"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.6118,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.65605516,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"21","issue":"5","first_page":"1051","last_page":"1067"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8333849906921387},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.784832239151001},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.5183014273643494},{"id":"https://openalex.org/keywords/link-encryption","display_name":"Link encryption","score":0.5083131194114685},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.5039390921592712},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5034081339836121},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.44892311096191406},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43963152170181274},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4144914448261261},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3879729211330414},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3668484389781952},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32347404956817627}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8333849906921387},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.784832239151001},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.5183014273643494},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.5083131194114685},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.5039390921592712},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5034081339836121},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.44892311096191406},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43963152170181274},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4144914448261261},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3879729211330414},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3668484389781952},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32347404956817627},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s10207-022-00597-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-022-00597-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00597-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/4de12c04-1a2c-47d5-b50d-025bc672870c","is_oa":true,"landing_page_url":"https://researchoutput.csu.edu.au/en/publications/4de12c04-1a2c-47d5-b50d-025bc672870c","pdf_url":null,"source":{"id":"https://openalex.org/S7407055442","display_name":"Charles Sturt University Research Output (CRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Camtepe, S, Duda, J, Mahboubi, A, Morawiecki, P, Nepal, S, Paw\u0142owski, M & Pieprzyk, J 2022, 'ANS-based compression and encryption with 128-bit security', IEEE Transactions on Information Forensics and Security, vol. 21, no. 5, pp. 1051-1067. https://doi.org/10.1007/s10207-022-00597-4","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.atira.dk:publications/e75d1e37-441c-48d0-8772-f51fe6076505","is_oa":true,"landing_page_url":"https://researchoutput.csu.edu.au/en/publications/e75d1e37-441c-48d0-8772-f51fe6076505","pdf_url":null,"source":{"id":"https://openalex.org/S7407055442","display_name":"Charles Sturt University Research Output (CRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Camtepe, S, Duda, J, Mahboubi, A, Morawiecki, P, Nepal, S, Paw\u0142owski, M & Pieprzyk, J 2022, 'ANS-based compression and encryption with 128-bit security', International Journal of Information Security, vol. 21, no. 5, pp. 1051\u20131067. https://doi.org/10.1007/s10207-022-00597-4","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ruj.uj.edu.pl:item/306815","is_oa":true,"landing_page_url":"https://link.springer.com/article/10.1007/s10207-022-00597-4","pdf_url":null,"source":{"id":"https://openalex.org/S4306400316","display_name":"Homo Politicus (Academy of Humanities and Economics in Lodz)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"artyku\u0142 w czasopi\u015bmie"}],"best_oa_location":{"id":"doi:10.1007/s10207-022-00597-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-022-00597-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-022-00597-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2196643393","display_name":null,"funder_award_id":"2018/31/B/ST6/03003","funder_id":"https://openalex.org/F4320322511","funder_display_name":"Narodowe Centrum Nauki"},{"id":"https://openalex.org/G4131288146","display_name":null,"funder_award_id":"DP180102199","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320322511","display_name":"Narodowe Centrum Nauki","ror":"https://ror.org/03ha2q922"},{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3183313386.pdf","grobid_xml":"https://content.openalex.org/works/W3183313386.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1542020576","https://openalex.org/W1572300106","https://openalex.org/W1577505202","https://openalex.org/W1629301835","https://openalex.org/W1763079358","https://openalex.org/W1822166485","https://openalex.org/W1964723977","https://openalex.org/W2046419776","https://openalex.org/W2060108852","https://openalex.org/W2072210981","https://openalex.org/W2129768577","https://openalex.org/W2142090582","https://openalex.org/W2752061190","https://openalex.org/W3041245763","https://openalex.org/W3179649659","https://openalex.org/W4289126832"],"related_works":["https://openalex.org/W2231057570","https://openalex.org/W3181603331","https://openalex.org/W2370942914","https://openalex.org/W3004922236","https://openalex.org/W4250199380","https://openalex.org/W2389178160","https://openalex.org/W4312293268","https://openalex.org/W2144246620","https://openalex.org/W2183295123","https://openalex.org/W4308992061"],"abstract_inverted_index":{"Abstract":[0],"The":[1,93,165],"bulk":[2],"of":[3,22,53,89,112,196],"Internet":[4],"interactions":[5],"is":[6,27,44,60,146],"highly":[7],"redundant":[8,33],"and":[9,17,35,47,80,91,114,154,161,173],"also":[10],"security":[11,160,169],"sensitive.":[12],"To":[13],"reduce":[14],"communication":[15],"bandwidth":[16],"provide":[18],"a":[19,24,75,99,117,121,155,186,193],"desired":[20],"level":[21],"security,":[23],"data":[25],"stream":[26],"first":[28],"compressed":[29],"to":[30,97,189],"squeeze":[31],"out":[32],"bits":[34],"then":[36],"encrypted":[37],"using":[38,102,148],"authenticated":[39],"encryption.":[40,158],"This":[41],"generic":[42],"solution":[43],"very":[45],"flexible":[46],"works":[48],"well":[49],"for":[50,170],"any":[51],"pair":[52],"(compression,":[54],"encryption)":[55],"algorithms.":[56],"Its":[57,159],"downside,":[58],"however,":[59],"the":[61,64,103],"fact":[62],"that":[63,73,78,116,179],"two":[65],"algorithms":[66],"are":[67,139,163],"designed":[68],"independently.":[69],"One":[70],"would":[71],"expect":[72],"designing":[74],"single":[76],"algorithm":[77,101,145,182],"compresses":[79],"encrypts":[81],"(called":[82],"compcrypt)":[83],"should":[84],"produce":[85],"benefits":[86],"in":[87],"terms":[88],"efficiency":[90,162],"security.":[92],"work":[94],"investigates":[95],"how":[96],"design":[98,166],"compcrypt":[100,144,181],"ANS":[104,113,119,134,149],"entropy":[105],"coding.":[106],"First,":[107],"we":[108,132],"examine":[109],"basic":[110],"properties":[111],"show":[115,178],"plain":[118],"with":[120,150,185],"hidden":[122],"encoding":[123],"table":[124],"can":[125],"be":[126],"broken":[127],"by":[128],"statistical":[129],"attacks.":[130],"Next,":[131],"study":[133],"behavior":[135],"when":[136],"its":[137],"states":[138],"chosen":[140],"at":[141],"random.":[142],"Our":[143,175],"built":[147],"randomized":[151],"state":[152],"jumps":[153],"sponge":[156],"MonkeyDuplex":[157],"discussed.":[164],"provides":[167],"128-bit":[168],"both":[171],"confidentiality":[172],"integrity/authentication.":[174],"implementation":[176],"experiments":[177],"our":[180],"processes":[183],"symbols":[184],"rate":[187],"up":[188],"269":[190],"MB/s":[191],"(with":[192],"slight":[194],"loss":[195],"compression":[197],"rate)":[198],"178":[199],"MB/s.":[200]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
