{"id":"https://openalex.org/W4399418742","doi":"https://doi.org/10.1145/3651671.3651754","title":"Research on Efficient Stream Cipher Design in Big Data Environment","display_name":"Research on Efficient Stream Cipher Design in Big Data Environment","publication_year":2024,"publication_date":"2024-02-02","ids":{"openalex":"https://openalex.org/W4399418742","doi":"https://doi.org/10.1145/3651671.3651754"},"language":"en","primary_location":{"id":"doi:10.1145/3651671.3651754","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3651671.3651754","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112380006","display_name":"Shilin Liu","orcid":"https://orcid.org/0009-0007-6665-7012"},"institutions":[{"id":"https://openalex.org/I1793135","display_name":"Yanbian University","ror":"https://ror.org/039xnh269","country_code":"CN","type":"education","lineage":["https://openalex.org/I1793135"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shilin Liu","raw_affiliation_strings":["Network Information Security Laboratory, Yanbian University, China"],"raw_orcid":"https://orcid.org/0009-0007-6665-7012","affiliations":[{"raw_affiliation_string":"Network Information Security Laboratory, Yanbian University, China","institution_ids":["https://openalex.org/I1793135"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066653953","display_name":"Zhexue Jin","orcid":"https://orcid.org/0000-0003-0769-2591"},"institutions":[{"id":"https://openalex.org/I1793135","display_name":"Yanbian University","ror":"https://ror.org/039xnh269","country_code":"CN","type":"education","lineage":["https://openalex.org/I1793135"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhexue Jin","raw_affiliation_strings":["Network Information Security Laboratory, Yanbian University, China"],"raw_orcid":"https://orcid.org/0000-0003-0769-2591","affiliations":[{"raw_affiliation_string":"Network Information Security Laboratory, Yanbian University, China","institution_ids":["https://openalex.org/I1793135"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110374999","display_name":"Yongzhen Li","orcid":"https://orcid.org/0000-0002-4747-4225"},"institutions":[{"id":"https://openalex.org/I1793135","display_name":"Yanbian University","ror":"https://ror.org/039xnh269","country_code":"CN","type":"education","lineage":["https://openalex.org/I1793135"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongzhen Li","raw_affiliation_strings":["Network Information Security Laboratory, Yanbian University, China"],"raw_orcid":"https://orcid.org/0000-0002-4747-4225","affiliations":[{"raw_affiliation_string":"Network Information Security Laboratory, Yanbian University, China","institution_ids":["https://openalex.org/I1793135"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112380006"],"corresponding_institution_ids":["https://openalex.org/I1793135"],"apc_list":null,"apc_paid":null,"fwci":0.3311,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62715838,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"36","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.8773565888404846},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7604594230651855},{"id":"https://openalex.org/keywords/stream-cipher-attack","display_name":"Stream cipher attack","score":0.7353681325912476},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.711499810218811},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.679574191570282},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6114650964736938},{"id":"https://openalex.org/keywords/cbc-mac","display_name":"CBC-MAC","score":0.5879389047622681},{"id":"https://openalex.org/keywords/triple-des","display_name":"Triple DES","score":0.5701918005943298},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.5009450912475586},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42803049087524414},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42590975761413574},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.41040316224098206},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4103710949420929},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.39707186818122864},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.3617817163467407},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.35203972458839417},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.2683798372745514},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.25158900022506714},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15224111080169678},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12292048335075378}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.8773565888404846},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7604594230651855},{"id":"https://openalex.org/C96675983","wikidata":"https://www.wikidata.org/wiki/Q7622661","display_name":"Stream cipher attack","level":4,"score":0.7353681325912476},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.711499810218811},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.679574191570282},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6114650964736938},{"id":"https://openalex.org/C156529985","wikidata":"https://www.wikidata.org/wiki/Q2736227","display_name":"CBC-MAC","level":4,"score":0.5879389047622681},{"id":"https://openalex.org/C90897222","wikidata":"https://www.wikidata.org/wiki/Q134983","display_name":"Triple DES","level":4,"score":0.5701918005943298},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.5009450912475586},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42803049087524414},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42590975761413574},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.41040316224098206},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4103710949420929},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39707186818122864},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.3617817163467407},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.35203972458839417},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.2683798372745514},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25158900022506714},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15224111080169678},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12292048335075378},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3651671.3651754","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3651671.3651754","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1521673900","https://openalex.org/W2294102877","https://openalex.org/W3163562952","https://openalex.org/W3177817521","https://openalex.org/W4200087606"],"related_works":["https://openalex.org/W2060011170","https://openalex.org/W2234432376","https://openalex.org/W2354856341","https://openalex.org/W2531227589","https://openalex.org/W2150486630","https://openalex.org/W3022854131","https://openalex.org/W2159145942","https://openalex.org/W2187592226","https://openalex.org/W4200241872","https://openalex.org/W3005443245"],"abstract_inverted_index":{"The":[0,87,143,249],"design":[1,34,109],"and":[2,27,35,139,165,256],"implementation":[3,37],"of":[4,12,19,24,30,38,62,90,122,127,135,152,207,243],"stream":[5,39,51,111,184,209,219],"cipher":[6,103,185],"algorithms":[7],"has":[8,253],"always":[9],"been":[10],"one":[11],"the":[13,17,22,28,33,46,60,79,100,106,110,117,125,133,136,149,166,177,183,204,211,235,240,244],"research":[14],"hotspots":[15],"in":[16,59,73,85,148,198,230],"field":[18],"cryptography.":[20],"With":[21],"diversification":[23],"application":[25],"environments":[26],"improvement":[29],"security":[31],"requirements,":[32],"efficient":[36],"ciphers":[40,52,58],"are":[41,160],"facing":[42],"new":[43],"challenges.":[44],"In":[45,181],"current":[47],"big":[48],"data":[49,70,236],"era,":[50],"have":[53],"more":[54],"advantages":[55],"than":[56,195,227],"block":[57,102,123,129,138,154,172],"efficiency":[61],"processing":[63,241],"large-capacity":[64],"data.":[65],"SEED":[66,91,101,189],"algorithm,":[67],"as":[68,105,132],"a":[69,93],"encryption":[71],"standard":[72],"South":[74],"Korea,":[75],"was":[76],"issued":[77],"by":[78,155,259],"Korea":[80],"Information":[81],"Security":[82],"Agency":[83],"(KISA)":[84],"1998.":[86],"overall":[88],"structure":[89],"is":[92,130,146,173,190,222,238,246],"16-round":[94],"Feistel":[95],"network.":[96],"This":[97,113],"paper":[98,114],"uses":[99],"algorithm":[104,186,221,245,251],"core":[107],"to":[108,116,175,203],"cipher.":[112],"refers":[115],"CFB":[118],"(Ciphertext":[119],"Feedback)":[120],"mode":[121,197,229],"cipher,":[124],"output":[126],"each":[128,153,163,171],"used":[131],"input":[134],"next":[137],"then":[140],"continues":[141],"on.":[142],"bit":[144,167],"value":[145],"extracted":[147,161,169],"intermediate":[150],"state":[151],"specific":[156],"rules,":[157],"256":[158],"bits":[159],"from":[162,170],"block,":[164],"sequence":[168],"concatenated":[174],"generate":[176],"final":[178,212],"key":[179,200,208,232],"stream.":[180,201,233],"theory,":[182],"based":[187],"on":[188],"about":[191,223],"2":[192],"times":[193,225],"faster":[194,226],"SEED-CFB":[196,228],"generating":[199,231],"Due":[202],"time":[205],"consumption":[206],"extraction,":[210],"experimental":[213],"results":[214],"show":[215],"that":[216],"SKE(SEED":[217],"Key":[218],"Extraction)":[220],"1.5":[224],"When":[234],"size":[237],"large,":[239],"speed":[242],"relatively":[247],"faster.":[248],"SKE":[250],"also":[252],"good":[254],"diffusion":[255],"avalanche":[257,260],"performance":[258],"effect":[261],"experiments.":[262]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
