{"id":"https://openalex.org/W2613467466","doi":"https://doi.org/10.1109/ciss.2017.7926080","title":"A simple construction of encryption for a tiny domain message","display_name":"A simple construction of encryption for a tiny domain message","publication_year":2017,"publication_date":"2017-03-01","ids":{"openalex":"https://openalex.org/W2613467466","doi":"https://doi.org/10.1109/ciss.2017.7926080","mag":"2613467466"},"language":"en","primary_location":{"id":"doi:10.1109/ciss.2017.7926080","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ciss.2017.7926080","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 51st Annual Conference on Information Sciences and Systems (CISS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014583794","display_name":"Rashed Mazumder","orcid":null},"institutions":[{"id":"https://openalex.org/I177738480","display_name":"Japan Advanced Institute of Science and Technology","ror":"https://ror.org/03frj4r98","country_code":"JP","type":"education","lineage":["https://openalex.org/I177738480"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Rashed Mazumder","raw_affiliation_strings":["School of Information Science, Japan Advanced Institute of Science and Technology, Nomi"],"affiliations":[{"raw_affiliation_string":"School of Information Science, Japan Advanced Institute of Science and Technology, Nomi","institution_ids":["https://openalex.org/I177738480"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010929606","display_name":"Atsuko Miyaji","orcid":"https://orcid.org/0000-0001-8822-5287"},"institutions":[{"id":"https://openalex.org/I177738480","display_name":"Japan Advanced Institute of Science and Technology","ror":"https://ror.org/03frj4r98","country_code":"JP","type":"education","lineage":["https://openalex.org/I177738480"]},{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Atsuko Miyaji","raw_affiliation_strings":["Graduate School of Engineering, Osaka University, Suita","School of Information Science, Japan Advanced Institute of Science and Technology, Nomi"],"affiliations":[{"raw_affiliation_string":"Graduate School of Engineering, Osaka University, Suita","institution_ids":["https://openalex.org/I98285908"]},{"raw_affiliation_string":"School of Information Science, Japan Advanced Institute of Science and Technology, Nomi","institution_ids":["https://openalex.org/I177738480"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045817362","display_name":"Chunhua Su","orcid":"https://orcid.org/0000-0002-6461-9684"},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Chunhua Su","raw_affiliation_strings":["Graduate School of Engineering, Osaka University, Suita"],"affiliations":[{"raw_affiliation_string":"Graduate School of Engineering, Osaka University, Suita","institution_ids":["https://openalex.org/I98285908"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014583794"],"corresponding_institution_ids":["https://openalex.org/I177738480"],"apc_list":null,"apc_paid":null,"fwci":0.39,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69041269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"8441","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8084412813186646},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7829304933547974},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.7338880896568298},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5798000693321228},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5654011368751526},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4919430911540985},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.4858374297618866},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.482399582862854},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4560037851333618},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4486643075942993},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4431869089603424},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42112284898757935}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8084412813186646},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7829304933547974},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.7338880896568298},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5798000693321228},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5654011368751526},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4919430911540985},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.4858374297618866},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.482399582862854},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4560037851333618},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4486643075942993},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4431869089603424},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42112284898757935},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ciss.2017.7926080","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ciss.2017.7926080","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 51st Annual Conference on Information Sciences and Systems (CISS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320338075","display_name":"Core Research for Evolutional Science and Technology","ror":"https://ror.org/00097mb19"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W15401403","https://openalex.org/W124928283","https://openalex.org/W160478803","https://openalex.org/W196598226","https://openalex.org/W200355028","https://openalex.org/W868507028","https://openalex.org/W1004367835","https://openalex.org/W1531712325","https://openalex.org/W1535147830","https://openalex.org/W1547189451","https://openalex.org/W1593404714","https://openalex.org/W1593510332","https://openalex.org/W1595669703","https://openalex.org/W1607874478","https://openalex.org/W1660562555","https://openalex.org/W1972464518","https://openalex.org/W1988037376","https://openalex.org/W2036823834","https://openalex.org/W2038818805","https://openalex.org/W2068516265","https://openalex.org/W2073613560","https://openalex.org/W2102314446","https://openalex.org/W2105103777","https://openalex.org/W2106698019","https://openalex.org/W2122432456","https://openalex.org/W2136620663","https://openalex.org/W2156449948","https://openalex.org/W2157829776","https://openalex.org/W2182783245","https://openalex.org/W2344474032","https://openalex.org/W2952957726","https://openalex.org/W3028683551","https://openalex.org/W6623744965","https://openalex.org/W6632153966","https://openalex.org/W6632678942","https://openalex.org/W6635581654","https://openalex.org/W6675728758","https://openalex.org/W6764620125"],"related_works":["https://openalex.org/W4240313302","https://openalex.org/W4315815885","https://openalex.org/W2915067502","https://openalex.org/W2188413349","https://openalex.org/W4385414763","https://openalex.org/W2387840805","https://openalex.org/W2361619969","https://openalex.org/W3022099831","https://openalex.org/W4205100462","https://openalex.org/W2030246973"],"abstract_inverted_index":{"In":[0,14,44,123],"modern":[1],"cryptography,":[2],"message":[3,41,59,69,108],"encryption":[4,70,109,186],"is":[5,18,42,177,206,235],"an":[6],"important":[7],"tool":[8],"for":[9,52,91,103,134,151,197,211],"providing":[10],"data-privacy":[11],"and":[12,33,48,55,83,101,119,129,144,171,209,215,254],"authenticity.":[13],"many":[15,46],"applications,":[16],"it":[17,189],"used":[19],"such":[20,80,165],"as":[21,81,166],"password":[22],"storage,":[23],"data":[24],"integrity":[25],"check,":[26],"wireless":[27],"network,":[28],"automated":[29],"teller":[30],"machine":[31],"card,":[32],"credit":[34],"card.":[35],"Usually,":[36],"the":[37,53,64,73,92,104,111,125,136,148,152,163,178,202,212,250],"size":[38,57,94,106,126,245,251],"of":[39,58,66,95,107,113,115,127,138,184,195,204,246,252],"a":[40,224,247],"arbitrary.":[43],"addition,":[45,124],"techniques":[47],"constructions":[49,75],"are":[50,76,89,99,256],"available":[51],"variable":[54],"fixed":[56],"encryption.":[60,141],"Interestingly,":[61],"we":[62,222],"address":[63],"issue":[65],"small":[67,105,139,238,244],"domain":[68,140],"(SDE).":[71],"Generally,":[72],"existing":[74],"based":[77,236],"on":[78,237],"blockcipher":[79],"AES/DES":[82],"scratch":[84],"function.":[85],"Hence,":[86],"these":[87,98,220],"solutions":[88],"reasonable":[90],"bigger":[93],"data.":[96],"However,":[97,188],"heavy":[100,208],"expensive":[102,210],"under":[110,162],"platform":[112],"Internet":[114],"Technology-end":[116],"device":[117],"(IoT),":[118],"resource":[120,216],"constrained":[121,217],"devices.":[122,218],"plaintext":[128,253],"ciphertext":[130,255],"should":[131],"be":[132],"equal":[133],"satisfying":[135],"property":[137],"Actually,":[142],"J.Black":[143],"P.Rogaway":[145],"formally":[146],"addressed":[147],"above":[149],"issues":[150],"first":[153],"time.":[154,187],"Following":[155],"that":[156,227],"certain":[157],"schemes":[158],"have":[159],"been":[160],"launched":[161],"SDE":[164],"Mix-and-Cut":[167],"shuffle,":[168],"Swap-or-Not,":[169],"Thorp-Shuffle,":[170],"FNR.":[172],"Moreover,":[173],"Sometimes-Recursive":[174],"shuffle":[175],"(SRS)":[176],"pioneer":[179],"construction":[180,203,241],"yet":[181],"in":[182],"respect":[183],"low":[185],"needs":[190],"to":[191],"execute":[192],"1000":[193],"calls":[194],"AES":[196],"achieving":[198],"full":[199],"security.":[200],"Therefore,":[201],"SRS":[205],"also":[207],"IoT":[213],"environment":[214],"Under":[219],"circumstances,":[221],"propose":[223],"simple":[225],"scheme":[226],"follows":[228],"by":[229],"Fiestel":[230],"structure.":[231],"The":[232],"internal":[233],"format":[234],"keyed-function.":[239],"Our":[240],"can":[242],"encrypt":[243],"message.":[248],"Furthermore,":[249],"equal.":[257]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
