{"id":"https://openalex.org/W3192255221","doi":"https://doi.org/10.1109/iwcmc51323.2021.9498850","title":"Towards Information Theoretic Interpretation of Practical Ciphers","display_name":"Towards Information Theoretic Interpretation of Practical Ciphers","publication_year":2021,"publication_date":"2021-06-28","ids":{"openalex":"https://openalex.org/W3192255221","doi":"https://doi.org/10.1109/iwcmc51323.2021.9498850","mag":"3192255221"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc51323.2021.9498850","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc51323.2021.9498850","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014400688","display_name":"Basem Abdellatif","orcid":null},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Basem Abdellatif","raw_affiliation_strings":["Computer Science and Engineering, University of California Riverside, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, University of California Riverside, USA","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089660851","display_name":"Tarek Elfouly","orcid":"https://orcid.org/0000-0002-1688-6163"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tarek Elfouly","raw_affiliation_strings":["Electrical and Computer Engineering, Tennessee Technological University, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Tennessee Technological University, USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051848738","display_name":"Khalid Abualsaud","orcid":"https://orcid.org/0000-0002-6693-3386"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Khalid Abualsaud","raw_affiliation_strings":["Computer Science and Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030059926","display_name":"Ala Gouissem","orcid":"https://orcid.org/0000-0002-5245-7681"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Ala Gouissem","raw_affiliation_strings":["Computer Science and Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012304239","display_name":"Elias Yaacoub","orcid":"https://orcid.org/0000-0002-3318-0621"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Elias Yaacoub","raw_affiliation_strings":["Computer Science and Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024641789","display_name":"Tamer Khattab","orcid":"https://orcid.org/0000-0003-2347-9555"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Tamer Khattab","raw_affiliation_strings":["Electrical Engineering, Qatar University, Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5014400688"],"corresponding_institution_ids":["https://openalex.org/I103635307"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10865914,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"807","last_page":"812"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7299767732620239},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.6329103112220764},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.6328327655792236},{"id":"https://openalex.org/keywords/equivocation","display_name":"Equivocation","score":0.6061879396438599},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5239489078521729},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5230998992919922},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5055909156799316},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.5048097372055054},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.48869040608406067},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4886646568775177},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4879876971244812},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4529780149459839},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.43048542737960815},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.4233188033103943},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.41966816782951355},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.4118092656135559},{"id":"https://openalex.org/keywords/interpretation","display_name":"Interpretation (philosophy)","score":0.4109261929988861},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.356492817401886},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.343824177980423},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.31166231632232666},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27211087942123413},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1709904670715332},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07297047972679138}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7299767732620239},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.6329103112220764},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.6328327655792236},{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.6061879396438599},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5239489078521729},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5230998992919922},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5055909156799316},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.5048097372055054},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.48869040608406067},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4886646568775177},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4879876971244812},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4529780149459839},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.43048542737960815},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.4233188033103943},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.41966816782951355},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.4118092656135559},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.4109261929988861},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.356492817401886},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.343824177980423},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.31166231632232666},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27211087942123413},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1709904670715332},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07297047972679138},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc51323.2021.9498850","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc51323.2021.9498850","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/35710","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/35710","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332753","display_name":"Qatar National Research Fund","ror":"https://ror.org/01svaqq28"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W132918488","https://openalex.org/W1483547755","https://openalex.org/W1535662987","https://openalex.org/W1537206908","https://openalex.org/W1567734037","https://openalex.org/W1586944506","https://openalex.org/W1629301835","https://openalex.org/W1953697049","https://openalex.org/W1964723977","https://openalex.org/W2067886306","https://openalex.org/W2091612798","https://openalex.org/W2106895305","https://openalex.org/W2109394932","https://openalex.org/W2119966192","https://openalex.org/W2122096983","https://openalex.org/W2123097583","https://openalex.org/W2761780303","https://openalex.org/W3034751195","https://openalex.org/W3045715216","https://openalex.org/W3046088015","https://openalex.org/W3046192472","https://openalex.org/W3098309759","https://openalex.org/W3135727394","https://openalex.org/W3138944253","https://openalex.org/W3173857081","https://openalex.org/W4241072010","https://openalex.org/W6632235518","https://openalex.org/W6640890013","https://openalex.org/W6641304879","https://openalex.org/W6791804760","https://openalex.org/W6797484453"],"related_works":["https://openalex.org/W1890290077","https://openalex.org/W2145668821","https://openalex.org/W2156908834","https://openalex.org/W2298331565","https://openalex.org/W2147348113","https://openalex.org/W2734623998","https://openalex.org/W1540366790","https://openalex.org/W2892391102","https://openalex.org/W744314595","https://openalex.org/W1928040504"],"abstract_inverted_index":{"In":[0,42,58,77],"spite":[1],"of":[2,6,40,69,109],"the":[3,21,67,70,90,95,102,107,110,117],"wide":[4],"spread":[5],"practical":[7],"crypto-":[8],"systems":[9],"and":[10,56,112],"ciphers":[11,111],"nowadays,":[12],"they":[13,24],"still":[14],"lack":[15],"a":[16],"unique":[17],"metric":[18],"to":[19,37,46,93],"measure":[20],"secrecy":[22],"level":[23],"provide.":[25],"Their":[26],"strength":[27,108],"is":[28,52],"measured":[29],"in":[30,54,74,100,105,113],"an":[31,63,87],"ad-hoc":[32],"way":[33],"by":[34],"exposing":[35],"them":[36,115],"different":[38],"kinds":[39],"attacks.":[41],"addition,":[43,78],"their":[44],"ability":[45],"hold":[47],"secure":[48],"against":[49],"these":[50,75],"attacks":[51],"evaluated":[53],"time":[55],"computations.":[57],"this":[59],"paper,":[60],"we":[61,79],"introduce":[62],"approach":[64],"for":[65,89],"calculating":[66],"equivocation":[68],"secret":[71],"key":[72],"used":[73,85,104],"ciphers.":[76],"prove":[80],"that":[81],"it":[82],"can":[83],"be":[84],"as":[86],"indicator":[88],"work":[91],"required":[92],"break":[94],"cipher.":[96],"This":[97],"will":[98],"help":[99],"unifying":[101],"metrics":[103],"evaluating":[106],"comparing":[114],"with":[116],"classical":[118],"information":[119],"theoretic":[120],"secreacy":[121],"measures.":[122]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
