{"id":"https://openalex.org/W2588809086","doi":"https://doi.org/10.1109/icitst.2016.7856683","title":"An adaptive security framework with extensible computational complexity for cipher systems","display_name":"An adaptive security framework with extensible computational complexity for cipher systems","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2588809086","doi":"https://doi.org/10.1109/icitst.2016.7856683","mag":"2588809086"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2016.7856683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070886868","display_name":"Prathap Siddavaatam","orcid":null},"institutions":[{"id":"https://openalex.org/I530967","display_name":"Toronto Metropolitan University","ror":"https://ror.org/05g13zd79","country_code":"CA","type":"education","lineage":["https://openalex.org/I530967"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Prathap Siddavaatam","raw_affiliation_strings":["Ryerson University, Toronto, ON, CA"],"affiliations":[{"raw_affiliation_string":"Ryerson University, Toronto, ON, CA","institution_ids":["https://openalex.org/I530967"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101714993","display_name":"Reza Sedaghat","orcid":"https://orcid.org/0000-0003-0023-7131"},"institutions":[{"id":"https://openalex.org/I530967","display_name":"Toronto Metropolitan University","ror":"https://ror.org/05g13zd79","country_code":"CA","type":"education","lineage":["https://openalex.org/I530967"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Reza Sedaghat","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Ryerson University, Toronto, ON"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Ryerson University, Toronto, ON","institution_ids":["https://openalex.org/I530967"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007662497","display_name":"Min Hsuan Cheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Min Hsuan Cheng","raw_affiliation_strings":["Solution Architecture and Engineering Division, NVIDIA Corporation, Taipei City, Taiwan"],"affiliations":[{"raw_affiliation_string":"Solution Architecture and Engineering Division, NVIDIA Corporation, Taipei City, Taiwan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5070886868"],"corresponding_institution_ids":["https://openalex.org/I530967"],"apc_list":null,"apc_paid":null,"fwci":0.4285,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.80853223,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"133","last_page":"140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6258535385131836},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6159085035324097},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5974971055984497},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.576147735118866},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.522206723690033},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5175678133964539},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.46382394433021545},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.435417115688324},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.4314887523651123},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3280071020126343},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27730268239974976},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15522173047065735}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6258535385131836},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6159085035324097},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5974971055984497},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.576147735118866},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.522206723690033},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5175678133964539},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.46382394433021545},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.435417115688324},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.4314887523651123},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3280071020126343},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27730268239974976},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15522173047065735}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2016.7856683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2016.7856683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1518236483","https://openalex.org/W1567164750","https://openalex.org/W1584004883","https://openalex.org/W1605116544","https://openalex.org/W1660562555","https://openalex.org/W1765803531","https://openalex.org/W1778915605","https://openalex.org/W1918243660","https://openalex.org/W2135084554"],"related_works":["https://openalex.org/W1967729419","https://openalex.org/W4312813683","https://openalex.org/W2029021368","https://openalex.org/W1531522605","https://openalex.org/W3159283027","https://openalex.org/W4232705780","https://openalex.org/W2903451324","https://openalex.org/W2965484163","https://openalex.org/W2512006651","https://openalex.org/W4384027664"],"abstract_inverted_index":{"Algebraic":[0],"cryptanalysis,":[1],"uses":[2],"a":[3,43,53,117],"range":[4],"of":[5,14,67,95,106,143,165,186],"algebraic":[6,28,65,163],"tools":[7],"and":[8,80,109,126,148],"techniques":[9],"to":[10,31,46,83,157],"assess":[11],"the":[12,64,93,103,162,166,174,179],"security":[13,49,78,133],"cryptosystems,":[15],"which":[16,134,160],"are":[17],"essential":[18],"for":[19,57,122],"trusted":[20],"communications":[21],"over":[22,39,60],"open":[23],"networks.":[24],"Recent":[25],"trends":[26],"in":[27,140,170],"cryptanalysis":[29],"tend":[30],"use":[32],"Modular":[33,58,69,96,124,187],"Addition":[34,59,70,97,125,188],"2":[35,71,189],"<sup":[36,72,190],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[37,73,191],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n</sup>":[38,74,192],"logic":[40],"Exclusive-OR":[41],"as":[42],"mixing":[44],"operator":[45],"guard":[47],"against":[48],"threats.":[50],"We":[51],"propose":[52,116],"newly":[54],"designed":[55],"framework":[56,121,152],"field":[61],"GF(2)":[62],"satisfying":[63],"properties":[66],"regular":[68],"albeit":[75],"with":[76,102],"cumulative":[77],"enhancements":[79],"increased":[81],"complexity":[82,94,182],"address":[84],"these":[85],"challenges.":[86],"Nevertheless,":[87],"it":[88,127,172],"has":[89],"been":[90],"observed":[91],"that":[92],"can":[98,153],"be":[99,154],"drastically":[100],"decreased":[101],"appropriate":[104],"formulation":[105],"polynomial":[107],"equations":[108],"probabilistic":[110,175],"conditions.":[111],"In":[112],"this":[113],"article":[114],"we":[115],"new":[118],"extended":[119],"design":[120],"advanced":[123],"is":[128],"characterized":[129],"by":[130,177],"user-specified":[131],"extendable":[132],"does":[135],"not":[136],"impose":[137],"additional":[138],"changes":[139],"existing":[141],"layout":[142],"ciphers":[144],"including":[145],"both":[146],"stream":[147],"block":[149],"ciphers.":[150],"This":[151],"rapidly":[155],"scaled":[156],"use-specific":[158],"requirements":[159],"boosts":[161],"degree":[164],"overall":[167],"structure.":[168],"This,":[169],"turn":[171],"thwarts":[173],"conditions":[176],"retaining":[178],"original":[180],"hardware":[181],"sans":[183],"critical":[184],"modifications":[185],".":[193]},"counts_by_year":[{"year":2021,"cited_by_count":5},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
