{"id":"https://openalex.org/W2133081827","doi":"https://doi.org/10.1109/cec.2008.4631226","title":"Fast symmetric keys generation via mutual mirroring process","display_name":"Fast symmetric keys generation via mutual mirroring process","publication_year":2008,"publication_date":"2008-06-01","ids":{"openalex":"https://openalex.org/W2133081827","doi":"https://doi.org/10.1109/cec.2008.4631226","mag":"2133081827"},"language":"en","primary_location":{"id":"doi:10.1109/cec.2008.4631226","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cec.2008.4631226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000411614","display_name":"Chun\u2010Shun Tseng","orcid":null},"institutions":[{"id":"https://openalex.org/I153512688","display_name":"National Taiwan Ocean University","ror":"https://ror.org/03bvvnt49","country_code":"TW","type":"education","lineage":["https://openalex.org/I153512688"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chun-Shun Tseng","raw_affiliation_strings":["Soft Computing Lab, Department of Electrical Engineering, National Taiwan Ocean University, Taiwan","Dept. of Electr. Eng., Nat. Taiwan Ocean Univ., Keelung"],"affiliations":[{"raw_affiliation_string":"Soft Computing Lab, Department of Electrical Engineering, National Taiwan Ocean University, Taiwan","institution_ids":["https://openalex.org/I153512688"]},{"raw_affiliation_string":"Dept. of Electr. Eng., Nat. Taiwan Ocean Univ., Keelung","institution_ids":["https://openalex.org/I153512688"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047492388","display_name":"Ya-Yun Jheng","orcid":null},"institutions":[{"id":"https://openalex.org/I153512688","display_name":"National Taiwan Ocean University","ror":"https://ror.org/03bvvnt49","country_code":"TW","type":"education","lineage":["https://openalex.org/I153512688"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ya-Yun Jheng","raw_affiliation_strings":["Soft Computing Lab, Department of Electrical Engineering, National Taiwan Ocean University, Taiwan","Dept. of Electr. Eng., Nat. Taiwan Ocean Univ., Keelung"],"affiliations":[{"raw_affiliation_string":"Soft Computing Lab, Department of Electrical Engineering, National Taiwan Ocean University, Taiwan","institution_ids":["https://openalex.org/I153512688"]},{"raw_affiliation_string":"Dept. of Electr. Eng., Nat. Taiwan Ocean Univ., Keelung","institution_ids":["https://openalex.org/I153512688"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073536149","display_name":"Sih-Yin Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I153512688","display_name":"National Taiwan Ocean University","ror":"https://ror.org/03bvvnt49","country_code":"TW","type":"education","lineage":["https://openalex.org/I153512688"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Sih-Yin Shen","raw_affiliation_strings":["Soft Computing Lab, Department of Electrical Engineering, National Taiwan Ocean University, Taiwan","Dept. of Electr. Eng., Nat. Taiwan Ocean Univ., Keelung"],"affiliations":[{"raw_affiliation_string":"Soft Computing Lab, Department of Electrical Engineering, National Taiwan Ocean University, Taiwan","institution_ids":["https://openalex.org/I153512688"]},{"raw_affiliation_string":"Dept. of Electr. Eng., Nat. Taiwan Ocean Univ., Keelung","institution_ids":["https://openalex.org/I153512688"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087247015","display_name":"Jung-Hua Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I153512688","display_name":"National Taiwan Ocean University","ror":"https://ror.org/03bvvnt49","country_code":"TW","type":"education","lineage":["https://openalex.org/I153512688"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jung-Hua Wang","raw_affiliation_strings":["Department of Electrical Engineering, National Taiwan Ocean University, Taiwan","Department of Electrical Engineering, National Taiwan Ocean University, Taiwan#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, National Taiwan Ocean University, Taiwan","institution_ids":["https://openalex.org/I153512688"]},{"raw_affiliation_string":"Department of Electrical Engineering, National Taiwan Ocean University, Taiwan#TAB#","institution_ids":["https://openalex.org/I153512688"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000411614"],"corresponding_institution_ids":["https://openalex.org/I153512688"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1431788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":null,"first_page":"3162","last_page":"3166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7979954481124878},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7523114085197449},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.6298655271530151},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5884878039360046},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5535722374916077},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5111866593360901},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.48720139265060425},{"id":"https://openalex.org/keywords/mirroring","display_name":"Mirroring","score":0.46307623386383057},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.45520830154418945},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4469083845615387},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4340290427207947},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.4212067723274231},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3746573030948639},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3678094148635864},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3438635468482971},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2941319942474365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1627601981163025}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7979954481124878},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7523114085197449},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.6298655271530151},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5884878039360046},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5535722374916077},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5111866593360901},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48720139265060425},{"id":"https://openalex.org/C189645446","wikidata":"https://www.wikidata.org/wiki/Q350865","display_name":"Mirroring","level":2,"score":0.46307623386383057},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.45520830154418945},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4469083845615387},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4340290427207947},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.4212067723274231},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3746573030948639},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3678094148635864},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3438635468482971},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2941319942474365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1627601981163025},{"id":"https://openalex.org/C46312422","wikidata":"https://www.wikidata.org/wiki/Q11024","display_name":"Communication","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cec.2008.4631226","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cec.2008.4631226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.608.6096","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.608.6096","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://softcomp.ee.ntou.edu.tw/publications/conference/fast_symmetric_keys_generation_via_mutual_mirroring_process.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1534388293","https://openalex.org/W1568223083","https://openalex.org/W1585665690","https://openalex.org/W1604915031","https://openalex.org/W1996360405","https://openalex.org/W2003736153","https://openalex.org/W2019191011","https://openalex.org/W2028374731","https://openalex.org/W2030550825","https://openalex.org/W2106287110","https://openalex.org/W2108834246","https://openalex.org/W2117420234","https://openalex.org/W2129967898","https://openalex.org/W2293746005","https://openalex.org/W2329123384","https://openalex.org/W2487705751","https://openalex.org/W3106450650","https://openalex.org/W4210694990","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W2384848998","https://openalex.org/W2965905066","https://openalex.org/W2029198293","https://openalex.org/W3094714434","https://openalex.org/W2241715175","https://openalex.org/W2113976983","https://openalex.org/W2519998931","https://openalex.org/W2189562814","https://openalex.org/W4395467106","https://openalex.org/W2034391529"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"an":[3,32,95,132],"eavesdropper-proof":[4],"algorithm":[5,91,103],"that":[6,36,75,93],"is":[7,92,128],"capable":[8],"of":[9,16,52,88,101],"fast":[10,66],"generating":[11],"symmetric":[12],"(secret)":[13],"keys.":[14],"Instead":[15],"literally":[17],"exchanging":[18],"secret":[19,55],"keys,":[20],"both":[21],"the":[22,83,89,102,105,114,121,136],"sender":[23],"and":[24,104],"receiver":[25],"adopt":[26],"a":[27,50,65],"mirroring":[28],"process":[29],"based":[30],"on":[31,44],"improved":[33],"Hebbian":[34],"rule":[35],"uses":[37],"identical":[38,54],"random":[39],"inputs":[40],"to":[41,48,63,112],"separately":[42],"train":[43],"their":[45],"reciprocal":[46],"outputs":[47],"generate":[49],"pair":[51],"exactly":[53],"key":[56,71,138],"strings.":[57],"Important":[58],"parameters":[59],"are":[60],"elaborately":[61],"characterized":[62],"implement":[64],"information":[67],"transmission":[68,106],"for":[69],"ephemeral":[70],"exchanging.":[72],"We":[73],"show":[74],"performance":[76],"optimization":[77],"can":[78],"be":[79],"achieved":[80],"by":[81],"coordinating":[82],"parameters.":[84],"One":[85],"essential":[86],"feature":[87],"proposed":[90],"even":[94],"eavesdropper":[96],"who":[97],"acquires":[98],"entire":[99],"structure":[100],"data":[107],"still":[108],"has":[109],"no":[110],"chance":[111],"decrypt":[113],"encrypted":[115],"message,":[116],"thus":[117],"ensuring":[118],"security":[119],"in":[120,131],"subsequent":[122],"encryption":[123],"task.":[124],"Moreover,":[125],"computation":[126],"load":[127],"well":[129],"bounded":[130],"acceptable":[133],"range":[134],"despite":[135],"increasing":[137],"length.":[139]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
