{"id":"https://openalex.org/W2890533404","doi":"https://doi.org/10.1142/s0218127418501146","title":"Cryptanalysis of Chaos-Based Cryptosystem from the Hardware Perspective","display_name":"Cryptanalysis of Chaos-Based Cryptosystem from the Hardware Perspective","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2890533404","doi":"https://doi.org/10.1142/s0218127418501146","mag":"2890533404"},"language":"en","primary_location":{"id":"doi:10.1142/s0218127418501146","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218127418501146","pdf_url":null,"source":{"id":"https://openalex.org/S81011612","display_name":"International Journal of Bifurcation and Chaos","issn_l":"0218-1274","issn":["0218-1274","1793-6551"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Bifurcation and Chaos","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100614733","display_name":"Yuling Luo","orcid":"https://orcid.org/0000-0002-0117-4614"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuling Luo","raw_affiliation_strings":["Guangxi Key Lab of Multi-Source Information Mining and Security, Faculty of Electronic Engineering, Guangxi Normal University, Guilin 541004, P. R. China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-Source Information Mining and Security, Faculty of Electronic Engineering, Guangxi Normal University, Guilin 541004, P. R. China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101567697","display_name":"Dezheng Zhang","orcid":"https://orcid.org/0000-0003-2062-338X"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dezheng Zhang","raw_affiliation_strings":["Guangxi Key Lab of Multi-Source Information Mining and Security, Faculty of Electronic Engineering, Guangxi Normal University, Guilin 541004, P. R. China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-Source Information Mining and Security, Faculty of Electronic Engineering, Guangxi Normal University, Guilin 541004, P. R. China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044091027","display_name":"Junxiu Liu","orcid":"https://orcid.org/0000-0002-9790-1571"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junxiu Liu","raw_affiliation_strings":["Guangxi Key Lab of Multi-Source Information Mining and Security, Faculty of Electronic Engineering, Guangxi Normal University, Guilin 541004, P. R. China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-Source Information Mining and Security, Faculty of Electronic Engineering, Guangxi Normal University, Guilin 541004, P. R. China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100783043","display_name":"Yunqi Liu","orcid":"https://orcid.org/0000-0001-5521-2316"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunqi Liu","raw_affiliation_strings":["Guangxi Key Lab of Multi-Source Information Mining and Security, Faculty of Electronic Engineering, Guangxi Normal University, Guilin 541004, P. R. China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Lab of Multi-Source Information Mining and Security, Faculty of Electronic Engineering, Guangxi Normal University, Guilin 541004, P. R. China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045986817","display_name":"Yi Cao","orcid":"https://orcid.org/0000-0002-5087-8861"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yi Cao","raw_affiliation_strings":["Department of Business Transformation and Sustainable Enterprise, Surrey Business School, University of Surrey, Surrey, GU2 7XH, UK"],"affiliations":[{"raw_affiliation_string":"Department of Business Transformation and Sustainable Enterprise, Surrey Business School, University of Surrey, Surrey, GU2 7XH, UK","institution_ids":["https://openalex.org/I28290843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026628154","display_name":"Xuemei Ding","orcid":"https://orcid.org/0000-0002-8644-4256"},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]},{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN","GB"],"is_corresponding":false,"raw_author_name":"Xuemei Ding","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350108, P. R. China","School of Computing, Engineering and Intelligent Systems, Ulster University, Londonderry, BT48 7JL, UK"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350108, P. R. China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"School of Computing, Engineering and Intelligent Systems, Ulster University, Londonderry, BT48 7JL, UK","institution_ids":["https://openalex.org/I138801177"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5044091027"],"corresponding_institution_ids":["https://openalex.org/I29739308"],"apc_list":null,"apc_paid":null,"fwci":0.8357,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.78909689,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"28","issue":"09","first_page":"1850114","last_page":"1850114"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.942300021648407,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.8299524188041687},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7587323784828186},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7517225742340088},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6812417507171631},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.663754940032959},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5733660459518433},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.5615935921669006},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.44397497177124023},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.43399763107299805},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4020165205001831},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.397381067276001},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35123980045318604},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09197476506233215}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.8299524188041687},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7587323784828186},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7517225742340088},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6812417507171631},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.663754940032959},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5733660459518433},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.5615935921669006},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.44397497177124023},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.43399763107299805},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4020165205001831},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.397381067276001},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35123980045318604},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09197476506233215}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1142/s0218127418501146","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218127418501146","pdf_url":null,"source":{"id":"https://openalex.org/S81011612","display_name":"International Journal of Bifurcation and Chaos","issn_l":"0218-1274","issn":["0218-1274","1793-6551"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Bifurcation and Chaos","raw_type":"journal-article"},{"id":"pmh:oai:alma.44SUR_INST:11139583530002346","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:epubs.surrey.ac.uk:846997","is_oa":false,"landing_page_url":"http://epubs.surrey.ac.uk/846997/1/ChaosCPAV10_01.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400680","display_name":"Surrey Research Insight Open Access (The University of Surrey)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28290843","host_organization_name":"University of Surrey","host_organization_lineage":["https://openalex.org/I28290843"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[{"id":"https://openalex.org/G4996085910","display_name":null,"funder_award_id":"61661008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7275613738","display_name":null,"funder_award_id":"2016GXNSFCA380017","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322768","display_name":"Natural Science Foundation of Guangxi Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W601637684","https://openalex.org/W1516007218","https://openalex.org/W1965685800","https://openalex.org/W1985725551","https://openalex.org/W1992546115","https://openalex.org/W2009955536","https://openalex.org/W2020039621","https://openalex.org/W2053001025","https://openalex.org/W2072291861","https://openalex.org/W2109394932","https://openalex.org/W2126870044","https://openalex.org/W2128712230","https://openalex.org/W2149472977","https://openalex.org/W2150401973","https://openalex.org/W2175079020","https://openalex.org/W2235965895","https://openalex.org/W2254095233","https://openalex.org/W2336401120","https://openalex.org/W2561013577","https://openalex.org/W2590582524","https://openalex.org/W2606080248","https://openalex.org/W2608492042","https://openalex.org/W2616688722","https://openalex.org/W2755855437","https://openalex.org/W3103339143","https://openalex.org/W4240560709","https://openalex.org/W4252343056"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W2989964095","https://openalex.org/W2164725015","https://openalex.org/W2782264121","https://openalex.org/W4323926098","https://openalex.org/W4384807855","https://openalex.org/W2004522261","https://openalex.org/W2022533428","https://openalex.org/W182679101","https://openalex.org/W1533979697"],"abstract_inverted_index":{"Chaos":[0],"has":[1,131],"been":[2,14],"used":[3,92],"in":[4,180],"cryptography":[5],"for":[6,109],"years":[7],"and":[8,69,151],"many":[9],"chaotic":[10,37,48,64,120,165],"cryptographic":[11,39,49,121],"systems":[12],"have":[13,29],"proposed.":[15],"Their":[16],"securities":[17],"are":[18,91],"often":[19],"evaluated":[20],"by":[21,55],"conducting":[22],"conventional":[23,78,126],"statistical":[24,79,127],"tests,":[25,81,128],"however":[26],"few":[27],"studies":[28],"referred":[30],"to":[31,93,134,159,172],"the":[32,36,44,47,57,77,99,101,110,119,125,132,142,161,164,174,177,181],"security":[33,45,80,96,111,162,175],"issue":[34],"of":[35,46,163,176],"hardware":[38,53,139,178],"systems.":[40],"This":[41,154],"paper":[42,155],"evaluates":[43],"system":[50,122],"from":[51,137],"a":[52,63,138],"perspective":[54,140],"using":[56,141],"side":[58,144],"channel":[59,145],"analysis":[60,104],"attack.":[61],"First,":[62],"block":[65],"cryptosystem":[66],"is":[67,106],"designed":[68],"implemented":[70],"based":[71],"on":[72],"an":[73],"Atmel":[74],"microcontroller.":[75],"Then":[76],"including":[82],"SP":[83],"800-22":[84],"test,":[85,88,90],"characters":[86],"frequency":[87],"avalanche":[89],"verify":[94],"its":[95],"performance.":[97],"In":[98],"meantime,":[100],"correlation":[102],"power":[103,152],"attack":[105],"carried":[107],"out":[108],"evaluation.":[112],"Experimental":[113],"results":[114],"demonstrate":[115],"that":[116],"even":[117],"though":[118],"can":[123,168],"pass":[124],"it":[129],"still":[130],"probability":[133],"be":[135],"attacked":[136],"leaked":[143],"information":[146],"such":[147],"as":[148],"execution":[149],"time":[150],"consumption.":[153],"proposes":[156],"another":[157],"way":[158],"analyze":[160],"cryptosystem,":[166],"which":[167],"aid":[169],"designing":[170],"mechanisms":[171],"enhance":[173],"cryptosystems":[179],"future.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
