{"id":"https://openalex.org/W2588428181","doi":"https://doi.org/10.1109/icitst.2016.7856661","title":"A commercial application of a chaos-based-stream cipher: Performance and Security analysis","display_name":"A commercial application of a chaos-based-stream cipher: Performance and Security analysis","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2588428181","doi":"https://doi.org/10.1109/icitst.2016.7856661","mag":"2588428181"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2016.7856661","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856661","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036315044","display_name":"Gerard Vidal","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gerard Vidal","raw_affiliation_strings":["Enigmedia Company, San Sebastian, Spain"],"affiliations":[{"raw_affiliation_string":"Enigmedia Company, San Sebastian, Spain","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029579736","display_name":"Rabei Becheikh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131288","display_name":"National Engineering School of Tunis","ror":"https://ror.org/03b1zjt31","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210131288","https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Rabei Becheikh","raw_affiliation_strings":["ENIT, RISC Laboratory, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"ENIT, RISC Laboratory, Tunis, Tunisia","institution_ids":["https://openalex.org/I4210131288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064186375","display_name":"Rhouma Rhouma","orcid":"https://orcid.org/0000-0002-5715-4110"},"institutions":[{"id":"https://openalex.org/I4210131288","display_name":"National Engineering School of Tunis","ror":"https://ror.org/03b1zjt31","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210131288","https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Rhouma Rhouma","raw_affiliation_strings":["ENIT, RISC Laboratory, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"ENIT, RISC Laboratory, Tunis, Tunisia","institution_ids":["https://openalex.org/I4210131288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056759341","display_name":"Safya Belghith","orcid":"https://orcid.org/0000-0001-7408-7848"},"institutions":[{"id":"https://openalex.org/I4210131288","display_name":"National Engineering School of Tunis","ror":"https://ror.org/03b1zjt31","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210131288","https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Safya Belghith","raw_affiliation_strings":["ENIT, RISC Laboratory, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"ENIT, RISC Laboratory, Tunis, Tunisia","institution_ids":["https://openalex.org/I4210131288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036315044"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.167,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.60934432,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"6","issue":null,"first_page":"39","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7905853986740112},{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.7487642168998718},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6635714173316956},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.6601343154907227},{"id":"https://openalex.org/keywords/stream-cipher-attack","display_name":"Stream cipher attack","score":0.5956462025642395},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5368642807006836},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.44684898853302},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4210047423839569},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4106124937534332},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3813185691833496},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3417699933052063},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2960650324821472}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7905853986740112},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.7487642168998718},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6635714173316956},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.6601343154907227},{"id":"https://openalex.org/C96675983","wikidata":"https://www.wikidata.org/wiki/Q7622661","display_name":"Stream cipher attack","level":4,"score":0.5956462025642395},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5368642807006836},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.44684898853302},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4210047423839569},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4106124937534332},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3813185691833496},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3417699933052063},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2960650324821472}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2016.7856661","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856661","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W298899479","https://openalex.org/W2006824395","https://openalex.org/W2012646342","https://openalex.org/W2022969128","https://openalex.org/W2025266594","https://openalex.org/W2026200010","https://openalex.org/W2044257293","https://openalex.org/W2052358343","https://openalex.org/W2098400079","https://openalex.org/W2099111195","https://openalex.org/W2103787876","https://openalex.org/W2105145864","https://openalex.org/W2109394932","https://openalex.org/W2115218296","https://openalex.org/W2278209866"],"related_works":["https://openalex.org/W3125786183","https://openalex.org/W2137478866","https://openalex.org/W1659518869","https://openalex.org/W2390578388","https://openalex.org/W1954550103","https://openalex.org/W4293907469","https://openalex.org/W2390218944","https://openalex.org/W2363245723","https://openalex.org/W2156444280","https://openalex.org/W168427323"],"abstract_inverted_index":{"We":[0,60],"present":[1],"a":[2,25],"commercial":[3],"software":[4],"based":[5,23,53],"product":[6],"that":[7,21,50],"allows":[8],"making":[9],"audio":[10],"and":[11,35,38,44],"video":[12],"conferences":[13],"as":[14,16,71,73],"well":[15,72],"sending":[17],"encrypted":[18],"instant":[19],"messages":[20],"are":[22],"in":[24,68],"chaos":[26,52],"stream":[27],"cipher.":[28],"This":[29,80],"paper":[30],"shows":[31],"measurements":[32],"on":[33,86],"battery":[34],"bandwidth":[36],"consumption":[37],"compares":[39],"them":[40],"with":[41],"current":[42],"state-of-the-art":[43],"widely":[45],"used":[46,67],"solutions.":[47],"Results":[48],"point":[49],"the":[51,63,69,87],"system":[54,81],"is":[55],"more":[56],"efficient":[57],"than":[58],"others.":[59],"also":[61],"describe":[62],"lightweight":[64],"encryption":[65],"algorithm":[66],"application":[70],"some":[74],"results":[75],"concerning":[76],"its":[77],"security":[78],"analysis.":[79],"achieves":[82],"savings":[83],"of":[84],"95%":[85],"CPU":[88],"compared":[89],"to":[90],"AES-256-CBC.":[91]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
