{"id":"https://openalex.org/W2884276405","doi":"https://doi.org/10.1142/s0218127418500864","title":"Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme","display_name":"Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme","publication_year":2018,"publication_date":"2018-06-30","ids":{"openalex":"https://openalex.org/W2884276405","doi":"https://doi.org/10.1142/s0218127418500864","mag":"2884276405"},"language":"en","primary_location":{"id":"doi:10.1142/s0218127418500864","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218127418500864","pdf_url":null,"source":{"id":"https://openalex.org/S81011612","display_name":"International Journal of Bifurcation and Chaos","issn_l":"0218-1274","issn":["0218-1274","1793-6551"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Bifurcation and Chaos","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026043071","display_name":"Zhuosheng Lin","orcid":"https://orcid.org/0000-0001-5963-8525"},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuosheng Lin","raw_affiliation_strings":["College of Automation, Guangdong University of Technology, Guangzhou 510006, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Automation, Guangdong University of Technology, Guangzhou 510006, P. R. China","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013127565","display_name":"Simin Yu","orcid":"https://orcid.org/0000-0002-1192-6955"},"institutions":[{"id":"https://openalex.org/I139024713","display_name":"Guangdong University of Technology","ror":"https://ror.org/04azbjn80","country_code":"CN","type":"education","lineage":["https://openalex.org/I139024713"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Simin Yu","raw_affiliation_strings":["College of Automation, Guangdong University of Technology, Guangzhou 510006, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Automation, Guangdong University of Technology, Guangzhou 510006, P. R. China","institution_ids":["https://openalex.org/I139024713"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101439689","display_name":"Xiutao Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210120485","display_name":"Academy of Mathematics and Systems Science","ror":"https://ror.org/02jkmyk67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210120485"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiutao Feng","raw_affiliation_strings":["Institute of Mathematics, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, P. R. China"],"affiliations":[{"raw_affiliation_string":"Institute of Mathematics, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, P. R. China","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027725400","display_name":"Jinhu L\u00fc","orcid":"https://orcid.org/0000-0003-0275-8387"},"institutions":[{"id":"https://openalex.org/I4210120485","display_name":"Academy of Mathematics and Systems Science","ror":"https://ror.org/02jkmyk67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210120485"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinhu L\u00fc","raw_affiliation_strings":["Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, P. R. China","School of Automation Science and Electrical Engineering, State Key Laboratory of Software Development Environment, and Beijing Advanced Innovation Center for Big Data, and Brain Computing, Beihang University, Beijing 100191, P. R. China"],"affiliations":[{"raw_affiliation_string":"Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, P. R. China","institution_ids":["https://openalex.org/I4210120485","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Automation Science and Electrical Engineering, State Key Laboratory of Software Development Environment, and Beijing Advanced Innovation Center for Big Data, and Brain Computing, Beihang University, Beijing 100191, P. R. China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101439689"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210120485"],"apc_list":null,"apc_paid":null,"fwci":1.5669,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.87721445,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"28","issue":"07","first_page":"1850086","last_page":"1850086"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.752930760383606},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7142188549041748},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.7028848528862},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.5651208758354187},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.53071129322052},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5255224108695984},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5037793517112732},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.48898088932037354},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4813731014728546},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4772734045982361},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.4649471342563629},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.41905859112739563},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41083014011383057},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40061357617378235},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3230002522468567},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22319906949996948},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.18786171078681946},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.13411158323287964},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.12085127830505371}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.752930760383606},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7142188549041748},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.7028848528862},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.5651208758354187},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.53071129322052},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5255224108695984},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5037793517112732},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.48898088932037354},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4813731014728546},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4772734045982361},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.4649471342563629},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.41905859112739563},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41083014011383057},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40061357617378235},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3230002522468567},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22319906949996948},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.18786171078681946},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.13411158323287964},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.12085127830505371}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218127418500864","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218127418500864","pdf_url":null,"source":{"id":"https://openalex.org/S81011612","display_name":"International Journal of Bifurcation and Chaos","issn_l":"0218-1274","issn":["0218-1274","1793-6551"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Bifurcation and Chaos","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W234321120","https://openalex.org/W1586944506","https://openalex.org/W1970660147","https://openalex.org/W1971225104","https://openalex.org/W1976813621","https://openalex.org/W1979198062","https://openalex.org/W1981938824","https://openalex.org/W1983093940","https://openalex.org/W2036408123","https://openalex.org/W2036904662","https://openalex.org/W2047919080","https://openalex.org/W2049277103","https://openalex.org/W2054716836","https://openalex.org/W2076397729","https://openalex.org/W2082574814","https://openalex.org/W2103526888","https://openalex.org/W2106152198","https://openalex.org/W2161517294","https://openalex.org/W2265791352","https://openalex.org/W2762234688","https://openalex.org/W3102949997"],"related_works":["https://openalex.org/W2144996145","https://openalex.org/W4312622838","https://openalex.org/W3028629590","https://openalex.org/W2070419236","https://openalex.org/W2125202793","https://openalex.org/W2884276405","https://openalex.org/W2571528214","https://openalex.org/W2849946107","https://openalex.org/W3194255513","https://openalex.org/W2809412765"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"the":[3,16,35,46,77,81,85,101,120,133,170,188],"security":[4],"performance":[5],"for":[6,23,119,154,182,186],"an":[7,162],"8D":[8],"self-synchronous":[9],"and":[10,31,38,69,132,194],"feedback-based":[11],"chaotic":[12,87,164],"stream":[13,165],"cipher":[14,166],"with":[15,113,169],"low":[17,171],"8":[18,172],"bits":[19,173],"of":[20,61,79,178],"state":[21,180],"variables":[22,181],"encryption":[24,183],"is":[25,73,89,152,184],"analyzed.":[26],"According":[27],"to":[28,44,66,143,158,190],"known-plaintext":[29],"attack":[30,68,150,193],"divide-and-conquer":[32,70,192],"attack,":[33,71],"only":[34,114],"second":[36],"plain-pixel":[37],"its":[39],"corresponding":[40],"cipher-pixel":[41],"are":[42],"required":[43,153],"decipher":[45],"secret":[47,102,121,134,156],"keys":[48,103,122,135,157],"[Formula:":[49,52,104,107,123,126,136,139],"see":[50,53,105,108,124,127,137,140],"text]":[51,54,106,109,125,128,138,141],"by":[55,96,130],"properly":[56],"setting":[57,97],"64":[58],"different":[59],"kinds":[60],"initial":[62,99],"conditions.":[63],"Then,":[64],"according":[65],"chosen-ciphertext":[67,195],"it":[72],"found":[74],"that":[75],"under":[76],"condition":[78],"selecting":[80],"ciphertext":[82,131],"as":[83,91],"zero,":[84],"original":[86],"equation":[88],"degenerated":[90],"a":[92,147],"linear":[93],"one.":[94],"So,":[95],"appropriate":[98],"conditions,":[100],"can":[110],"be":[111,159],"deciphered":[112],"four":[115],"iterative":[116],"operations.":[117],"As":[118],"multiplied":[129],"related":[142],"nonlinear":[144,176],"functions,":[145],"maybe":[146],"more":[148],"powerful":[149],"method":[151],"these":[155],"deciphered.":[160],"Finally,":[161],"improved":[163],"scheme":[167],"equipped":[168],"derived":[174],"from":[175],"operation":[177],"multiple":[179],"proposed":[185],"improving":[187],"ability":[189],"resist":[191],"attack.":[196]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
