{"id":"https://openalex.org/W4407829349","doi":"https://doi.org/10.1007/s10207-025-00995-4","title":"Pseudorandom bit generation with asymmetric numeral systems","display_name":"Pseudorandom bit generation with asymmetric numeral systems","publication_year":2025,"publication_date":"2025-02-21","ids":{"openalex":"https://openalex.org/W4407829349","doi":"https://doi.org/10.1007/s10207-025-00995-4"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-00995-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-00995-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-00995-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-00995-4.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045977578","display_name":"Josef Pieprzyk","orcid":"https://orcid.org/0000-0002-1917-6466"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I4210087266","display_name":"Institute of Computer Science","ror":"https://ror.org/003fvp964","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210087266","https://openalex.org/I99542240"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I99542240","display_name":"Polish Academy of Sciences","ror":"https://ror.org/01dr6c206","country_code":"PL","type":"government","lineage":["https://openalex.org/I99542240"]}],"countries":["AU","PL"],"is_corresponding":true,"raw_author_name":"Josef Pieprzyk","raw_affiliation_strings":["Data61, CSIRO, Sydney, Australia","Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland","institution_ids":["https://openalex.org/I99542240","https://openalex.org/I4210087266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075545991","display_name":"Marcin Paw\u0142owski","orcid":"https://orcid.org/0000-0002-5145-9220"},"institutions":[{"id":"https://openalex.org/I126596746","display_name":"Jagiellonian University","ror":"https://ror.org/03bqmcz70","country_code":"PL","type":"education","lineage":["https://openalex.org/I126596746"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Marcin Paw\u0142owski","raw_affiliation_strings":["Jagiellonian University, Krak\u00f3w, Poland"],"affiliations":[{"raw_affiliation_string":"Jagiellonian University, Krak\u00f3w, Poland","institution_ids":["https://openalex.org/I126596746"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005443087","display_name":"Pawe\u0142 Morawiecki","orcid":"https://orcid.org/0000-0003-3349-8645"},"institutions":[{"id":"https://openalex.org/I4210087266","display_name":"Institute of Computer Science","ror":"https://ror.org/003fvp964","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210087266","https://openalex.org/I99542240"]},{"id":"https://openalex.org/I99542240","display_name":"Polish Academy of Sciences","ror":"https://ror.org/01dr6c206","country_code":"PL","type":"government","lineage":["https://openalex.org/I99542240"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Pawe\u0142 Morawiecki","raw_affiliation_strings":["Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland","institution_ids":["https://openalex.org/I99542240","https://openalex.org/I4210087266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021725402","display_name":"Arash Mahboubi","orcid":"https://orcid.org/0000-0002-0487-0615"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Arash Mahboubi","raw_affiliation_strings":["Charles Sturt University, Port Macquarie, Australia"],"affiliations":[{"raw_affiliation_string":"Charles Sturt University, Port Macquarie, Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109420627","display_name":"Jarek Duda","orcid":null},"institutions":[{"id":"https://openalex.org/I126596746","display_name":"Jagiellonian University","ror":"https://ror.org/03bqmcz70","country_code":"PL","type":"education","lineage":["https://openalex.org/I126596746"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Jarek Duda","raw_affiliation_strings":["Jagiellonian University, Krak\u00f3w, Poland"],"affiliations":[{"raw_affiliation_string":"Jagiellonian University, Krak\u00f3w, Poland","institution_ids":["https://openalex.org/I126596746"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084022157","display_name":"Seyit Camtepe","orcid":"https://orcid.org/0000-0001-6353-8359"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Seyit Camtepe","raw_affiliation_strings":["Data61, CSIRO, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5045977578"],"corresponding_institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I4210087266","https://openalex.org/I42894916","https://openalex.org/I99542240"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":1.3556,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.77980972,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"24","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bit","display_name":"Bit (key)","score":0.7898987531661987},{"id":"https://openalex.org/keywords/numeral-system","display_name":"Numeral system","score":0.7571021318435669},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7485302686691284},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.7188276648521423},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6288074851036072},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.5347577333450317},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.4414740800857544},{"id":"https://openalex.org/keywords/pseudorandom-generator-theorem","display_name":"Pseudorandom generator theorem","score":0.4298633337020874},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3719712495803833},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.337206095457077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27629220485687256},{"id":"https://openalex.org/keywords/pseudorandom-generator","display_name":"Pseudorandom generator","score":0.24902930855751038},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16804540157318115},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15805909037590027}],"concepts":[{"id":"https://openalex.org/C117011727","wikidata":"https://www.wikidata.org/wiki/Q1278488","display_name":"Bit (key)","level":2,"score":0.7898987531661987},{"id":"https://openalex.org/C204160518","wikidata":"https://www.wikidata.org/wiki/Q122653","display_name":"Numeral system","level":2,"score":0.7571021318435669},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7485302686691284},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.7188276648521423},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6288074851036072},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.5347577333450317},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.4414740800857544},{"id":"https://openalex.org/C180233235","wikidata":"https://www.wikidata.org/wiki/Q7255475","display_name":"Pseudorandom generator theorem","level":4,"score":0.4298633337020874},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3719712495803833},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.337206095457077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27629220485687256},{"id":"https://openalex.org/C92913381","wikidata":"https://www.wikidata.org/wiki/Q7255474","display_name":"Pseudorandom generator","level":3,"score":0.24902930855751038},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16804540157318115},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15805909037590027}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10207-025-00995-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-00995-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-00995-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:ruj.uj.edu.pl:item/549313","is_oa":true,"landing_page_url":"https://link.springer.com/article/10.1007/s10207-025-00995-4","pdf_url":"http://ruj.uj.edu.pl/bitstreams/9fe9d817-4fd2-455d-8e4c-a3bad074825d/download","source":{"id":"https://openalex.org/S4306400316","display_name":"Homo Politicus (Academy of Humanities and Economics in Lodz)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"artyku\u0142 w czasopi\u015bmie"},{"id":"pmh:oai:pure.atira.dk:publications/dd102cc5-55ac-4c95-82fe-a11d614eb387","is_oa":true,"landing_page_url":"https://researchoutput.csu.edu.au/en/publications/dd102cc5-55ac-4c95-82fe-a11d614eb387","pdf_url":null,"source":{"id":"https://openalex.org/S7407055442","display_name":"Charles Sturt University Research Output (CRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Pieprzyk, J, Paw\u0142owski, M, Morawiecki, P, Mahboubi, A, Duda, J & Camtepe, S 2025, 'Pseudorandom bit generation with asymmetric numeral systems', International Journal of Information Security, vol. 24, no. 2, 82, pp. 1-18. https://doi.org/10.1007/s10207-025-00995-4","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-00995-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-00995-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-00995-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320386","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4407829349.pdf","grobid_xml":"https://content.openalex.org/works/W4407829349.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W390146837","https://openalex.org/W1532323625","https://openalex.org/W1589640982","https://openalex.org/W1976677460","https://openalex.org/W2060108852","https://openalex.org/W2084652510","https://openalex.org/W2085759780","https://openalex.org/W2108104892","https://openalex.org/W2148892264","https://openalex.org/W3023478445","https://openalex.org/W3089702008","https://openalex.org/W3150645827","https://openalex.org/W3179649659","https://openalex.org/W4231286867","https://openalex.org/W4236509984","https://openalex.org/W4243494487","https://openalex.org/W6817869195"],"related_works":["https://openalex.org/W44435986","https://openalex.org/W2988803943","https://openalex.org/W2062045810","https://openalex.org/W3111658143","https://openalex.org/W2068428530","https://openalex.org/W1988459222","https://openalex.org/W2775374936","https://openalex.org/W1503711153","https://openalex.org/W1534576401","https://openalex.org/W2626887348"],"abstract_inverted_index":{"Abstract":[0],"The":[1,36,50],"generation":[2],"of":[3,8,52,102,118,156,212],"pseudorandom":[4],"binary":[5],"sequences":[6],"is":[7,135,206,226],"great":[9],"importance":[10],"in":[11,79,181],"numerous":[12],"applications,":[13],"ranging":[14],"from":[15,62,137],"simulation":[16],"and":[17,69,131,174,191,214],"gambling":[18],"to":[19,73,93],"cryptography.":[20],"Pseudorandom":[21],"bit":[22],"generators":[23],"(PRBGs)":[24],"can":[25],"be":[26],"divided":[27],"into":[28],"two":[29],"categories":[30],"based":[31,105],"on":[32,57,90,106],"their":[33,87,91],"claimed":[34],"security.":[35],"first":[37,64],"category":[38,55,65,82],"includes":[39],"PRBGs":[40,61,119,152],"that":[41,133,195,223],"are":[42,66,71,83],"provably":[43,207],"secure,":[44],"such":[45],"as":[46],"the":[47,53,63,80,107,182,196],"Blum\u2013Blum\u2013Shub":[48],"generator.":[49],"security":[51,88],"second":[54,81],"relies":[56],"heuristic":[58],"arguments.":[59],"Unfortunately,":[60],"inherently":[67],"inefficient,":[68],"some":[70],"vulnerable":[72],"quantum":[74,229],"attacks.":[75,96],"In":[76],"contrast,":[77],"those":[78],"highly":[84],"efficient,":[85],"though":[86],"depends":[89],"resistance":[92],"known":[94],"cryptographic":[95],"This":[97],"work":[98],"presents":[99],"a":[100,103,116,138],"construction":[101],"PRBG":[104,204,225],"asymmetric":[108],"numeral":[109],"system":[110],"(ANS)":[111],"compression":[112],"algorithm.":[113],"We":[114,185],"define":[115],"family":[117],"for":[120,142,177,209,217],"$$2^R$$":[121],"<mml:math":[122,162],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[123,163],"<mml:msup>":[124],"<mml:mn>2</mml:mn>":[125],"<mml:mi>R</mml:mi>":[126,165],"</mml:msup>":[127],"</mml:math>":[128,173],"ANS":[129],"states":[130],"prove":[132],"it":[134],"indistinguishable":[136],"truly":[139],"random":[140],"generator":[141],"sufficiently":[143],"large":[144,210],"R":[145,213],".":[146],"To":[147],"enhance":[148],"efficiency,":[149],"we":[150,221],"explore":[151],"with":[153],"smaller":[154,218],"values":[155,211],"$$R":[157],"=":[158],"7,":[159],"8,":[160],"9$$":[161],"<mml:mrow>":[164],"<mml:mo>=</mml:mo>":[166],"<mml:mn>7</mml:mn>":[167],"<mml:mo>,</mml:mo>":[168,170],"<mml:mn>8</mml:mn>":[169],"<mml:mn>9</mml:mn>":[171],"</mml:mrow>":[172],"demonstrate":[175],"methods":[176],"removing":[178],"local":[179],"correlations":[180],"output":[183,187],"stream.":[184],"permute":[186],"bits":[188,198],"using":[189],"rotation":[190],"Keccak":[192],"transformations,":[193],"showing":[194],"permuted":[197],"pass":[199],"all":[200],"NIST":[201],"tests.":[202],"Our":[203],"design":[205],"secure":[208,216,227],"heuristically":[215],"values.":[219],"Additionally,":[220],"claim":[222],"our":[224],"against":[228],"adversaries.":[230]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-10-10T00:00:00"}
