{"id":"https://openalex.org/W1989883819","doi":"https://doi.org/10.1109/ewdts.2011.6116574","title":"Maintaining uniformity in the processes of encryption and decryption with a variable number of encryption rounds","display_name":"Maintaining uniformity in the processes of encryption and decryption with a variable number of encryption rounds","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W1989883819","doi":"https://doi.org/10.1109/ewdts.2011.6116574","mag":"1989883819"},"language":"en","primary_location":{"id":"doi:10.1109/ewdts.2011.6116574","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts.2011.6116574","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 9th East-West Design &amp; Test Symposium (EWDTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036913891","display_name":"\u0141. Smoli\u0144ski","orcid":null},"institutions":[{"id":"https://openalex.org/I46305939","display_name":"University of Zielona G\u00f3ra","ror":"https://ror.org/04fzm7v55","country_code":"PL","type":"education","lineage":["https://openalex.org/I46305939"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"L. Smolinski","raw_affiliation_strings":["Institute of Computer Engineering and Electronics, Zielona Gora, Poland","Institute of Computer Engineering and Electronics, Podg\u00f3rna 50, Zielona G\u00f3ra, Poland#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering and Electronics, Zielona Gora, Poland","institution_ids":["https://openalex.org/I46305939"]},{"raw_affiliation_string":"Institute of Computer Engineering and Electronics, Podg\u00f3rna 50, Zielona G\u00f3ra, Poland#TAB#","institution_ids":["https://openalex.org/I46305939"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5036913891"],"corresponding_institution_ids":["https://openalex.org/I46305939"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07218554,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"131","last_page":"135"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9890999794006348,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8634659647941589},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7098550200462341},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6530264019966125},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.595833420753479},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.5690382719039917},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5335811376571655},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.4716792702674866},{"id":"https://openalex.org/keywords/disk-encryption-theory","display_name":"Disk encryption theory","score":0.4674827456474304},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4662455916404724},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.4451448619365692},{"id":"https://openalex.org/keywords/disk-encryption-hardware","display_name":"Disk encryption hardware","score":0.43890637159347534},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.43473055958747864},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3726978302001953},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32299917936325073},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.29415497183799744},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2901121973991394},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24343353509902954},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23407462239265442}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8634659647941589},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7098550200462341},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6530264019966125},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.595833420753479},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.5690382719039917},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5335811376571655},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.4716792702674866},{"id":"https://openalex.org/C122874069","wikidata":"https://www.wikidata.org/wiki/Q5282312","display_name":"Disk encryption theory","level":5,"score":0.4674827456474304},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4662455916404724},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.4451448619365692},{"id":"https://openalex.org/C61719626","wikidata":"https://www.wikidata.org/wiki/Q17081362","display_name":"Disk encryption hardware","level":5,"score":0.43890637159347534},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.43473055958747864},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3726978302001953},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32299917936325073},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.29415497183799744},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2901121973991394},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24343353509902954},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23407462239265442}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ewdts.2011.6116574","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts.2011.6116574","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 9th East-West Design &amp; Test Symposium (EWDTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1516587133","https://openalex.org/W2007326055","https://openalex.org/W2021040705"],"related_works":["https://openalex.org/W2353757486","https://openalex.org/W2539357035","https://openalex.org/W2165314391","https://openalex.org/W2327933808","https://openalex.org/W4283388250","https://openalex.org/W2376666149","https://openalex.org/W3104073701","https://openalex.org/W2381892741","https://openalex.org/W2144246620","https://openalex.org/W2111426419"],"abstract_inverted_index":{"Article":[0],"presents":[1],"modification":[2,41],"for":[3,11,20],"the":[4,21,25,33],"cryptographic":[5],"hardware":[6],"accelerators.":[7],"Modification,":[8],"which":[9],"allows":[10,19],"add":[12],"new":[13],"functionality":[14],"to":[15],"cryptography":[16],"systems.":[17],"Functionality":[18],"dynamic":[22],"changes":[23],"in":[24,32],"number":[26],"of":[27,35],"rounds":[28],"with":[29],"maintaining":[30],"uniformity":[31],"processes":[34],"encryption":[36],"and":[37],"decryption.":[38],"The":[39],"proposed":[40],"was":[42],"discussed":[43],"on":[44],"DES":[45],"algorithm":[46],"example.":[47]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
