{"id":"https://openalex.org/W2158323623","doi":"https://doi.org/10.1112/s146115701200109x","title":"On the use of expansion series for stream ciphers","display_name":"On the use of expansion series for stream ciphers","publication_year":2012,"publication_date":"2012-09-01","ids":{"openalex":"https://openalex.org/W2158323623","doi":"https://doi.org/10.1112/s146115701200109x","mag":"2158323623"},"language":"en","primary_location":{"id":"doi:10.1112/s146115701200109x","is_oa":true,"landing_page_url":"https://doi.org/10.1112/s146115701200109x","pdf_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/DF4A8E45F3A76E4D425CA22D2C3077B8/S146115701200109Xa.pdf/div-class-title-on-the-use-of-expansion-series-for-stream-ciphers-div.pdf","source":{"id":"https://openalex.org/S118668765","display_name":"LMS Journal of Computation and Mathematics","issn_l":"1461-1570","issn":["1461-1570"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311874","host_organization_name":"London Mathematical Society","host_organization_lineage":["https://openalex.org/P4310311874"],"host_organization_lineage_names":["London Mathematical Society"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"LMS Journal of Computation and Mathematics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/DF4A8E45F3A76E4D425CA22D2C3077B8/S146115701200109Xa.pdf/div-class-title-on-the-use-of-expansion-series-for-stream-ciphers-div.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026994882","display_name":"Claus Diem","orcid":null},"institutions":[{"id":"https://openalex.org/I926574661","display_name":"Leipzig University","ror":"https://ror.org/03s7gtk40","country_code":"DE","type":"education","lineage":["https://openalex.org/I926574661"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Claus Diem","raw_affiliation_strings":["Mathematical Institute, University of Leipzig, Johannisgasse 26, D-04103 Leipzig, Germany"],"affiliations":[{"raw_affiliation_string":"Mathematical Institute, University of Leipzig, Johannisgasse 26, D-04103 Leipzig, Germany","institution_ids":["https://openalex.org/I926574661"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5026994882"],"corresponding_institution_ids":["https://openalex.org/I926574661"],"apc_list":null,"apc_paid":null,"fwci":0.4281,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.7353105,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"15","issue":null,"first_page":"326","last_page":"340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.8202714323997498},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.6217026114463806},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.5873154401779175},{"id":"https://openalex.org/keywords/power-series","display_name":"Power series","score":0.5593271851539612},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5117825865745544},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.44008970260620117},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.35949569940567017},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29426130652427673},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.25274789333343506},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.14143013954162598},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.0929398238658905},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.0798703134059906}],"concepts":[{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.8202714323997498},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.6217026114463806},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.5873154401779175},{"id":"https://openalex.org/C73905626","wikidata":"https://www.wikidata.org/wiki/Q206925","display_name":"Power series","level":2,"score":0.5593271851539612},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5117825865745544},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.44008970260620117},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.35949569940567017},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29426130652427673},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25274789333343506},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.14143013954162598},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0929398238658905},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0798703134059906},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1112/s146115701200109x","is_oa":true,"landing_page_url":"https://doi.org/10.1112/s146115701200109x","pdf_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/DF4A8E45F3A76E4D425CA22D2C3077B8/S146115701200109Xa.pdf/div-class-title-on-the-use-of-expansion-series-for-stream-ciphers-div.pdf","source":{"id":"https://openalex.org/S118668765","display_name":"LMS Journal of Computation and Mathematics","issn_l":"1461-1570","issn":["1461-1570"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311874","host_organization_name":"London Mathematical Society","host_organization_lineage":["https://openalex.org/P4310311874"],"host_organization_lineage_names":["London Mathematical Society"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"LMS Journal of Computation and Mathematics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1112/s146115701200109x","is_oa":true,"landing_page_url":"https://doi.org/10.1112/s146115701200109x","pdf_url":"https://www.cambridge.org/core/services/aop-cambridge-core/content/view/DF4A8E45F3A76E4D425CA22D2C3077B8/S146115701200109Xa.pdf/div-class-title-on-the-use-of-expansion-series-for-stream-ciphers-div.pdf","source":{"id":"https://openalex.org/S118668765","display_name":"LMS Journal of Computation and Mathematics","issn_l":"1461-1570","issn":["1461-1570"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311874","host_organization_name":"London Mathematical Society","host_organization_lineage":["https://openalex.org/P4310311874"],"host_organization_lineage_names":["London Mathematical Society"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"LMS Journal of Computation and Mathematics","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2158323623.pdf","grobid_xml":"https://content.openalex.org/works/W2158323623.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W188374680","https://openalex.org/W1496801598","https://openalex.org/W1512922533","https://openalex.org/W1514553092","https://openalex.org/W1514721180","https://openalex.org/W1516318957","https://openalex.org/W1517403092","https://openalex.org/W1586944506","https://openalex.org/W1779402607","https://openalex.org/W1989603733","https://openalex.org/W1999289880","https://openalex.org/W2042477066","https://openalex.org/W2073916736","https://openalex.org/W2081614339","https://openalex.org/W2104436223","https://openalex.org/W2483831233","https://openalex.org/W2495148038","https://openalex.org/W2495611469","https://openalex.org/W2499339068","https://openalex.org/W2502753018","https://openalex.org/W2593411133","https://openalex.org/W2913925549","https://openalex.org/W3007836994","https://openalex.org/W4248269519","https://openalex.org/W4249844765","https://openalex.org/W4293193836","https://openalex.org/W6757954607","https://openalex.org/W6825343983"],"related_works":["https://openalex.org/W1993426457","https://openalex.org/W2372176563","https://openalex.org/W2068949639","https://openalex.org/W3023620486","https://openalex.org/W4254345474","https://openalex.org/W2369485329","https://openalex.org/W4389457727","https://openalex.org/W1993206725","https://openalex.org/W4390458526","https://openalex.org/W2390916851"],"abstract_inverted_index":{"Abstract":[0],"From":[1],"power":[2],"series":[3],"expansions":[4],"of":[5,49,80,83],"functions":[6],"on":[7],"curves":[8],"over":[9],"finite":[10],"fields,":[11],"one":[12],"can":[13,52],"obtain":[14],"sequences":[15,34,51,60,84],"with":[16],"perfect":[17,20],"or":[18],"almost":[19],"linear":[21],"complexity":[22,82],"profile.":[23],"It":[24],"has":[25],"been":[26],"suggested":[27],"by":[28],"various":[29],"authors":[30],"to":[31,65,76],"use":[32],"such":[33,50],"as":[35],"key":[36],"streams":[37],"for":[38],"stream":[39],"ciphers.":[40],"In":[41],"this":[42],"work,":[43],"we":[44,86],"show":[45],"how":[46],"long":[47],"parts":[48],"be":[53,63,66],"computed":[54],"efficiently":[55],"from":[56],"short":[57],"ones.":[58],"Such":[59],"should":[61],"therefore":[62],"considered":[64],"cryptographically":[67],"weak.":[68],"Our":[69],"attack":[70],"leads":[71],"in":[72],"a":[73,77],"natural":[74],"way":[75],"new":[78],"measure":[79],"the":[81],"which":[85],"call":[87],"expansion":[88],"complexity.":[89]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
