{"id":"https://openalex.org/W2930422556","doi":"https://doi.org/10.1155/2019/2137561","title":"On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree","display_name":"On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2930422556","doi":"https://doi.org/10.1155/2019/2137561","mag":"2930422556"},"language":"en","primary_location":{"id":"doi:10.1155/2019/2137561","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/2137561","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/2137561.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2019/2137561.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062430200","display_name":"Vasyl Ustimenko","orcid":"https://orcid.org/0000-0002-2138-2357"},"institutions":[{"id":"https://openalex.org/I174183983","display_name":"Maria Curie-Sk\u0142odowska University","ror":"https://ror.org/015h0qg34","country_code":"PL","type":"education","lineage":["https://openalex.org/I174183983"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Vasyl Ustimenko","raw_affiliation_strings":["Maria Curie-Sk\u0142odowska University, Poland"],"affiliations":[{"raw_affiliation_string":"Maria Curie-Sk\u0142odowska University, Poland","institution_ids":["https://openalex.org/I174183983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031076725","display_name":"Urszula Roma\u0144czuk","orcid":"https://orcid.org/0000-0002-8539-7603"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Urszula Roma\u0144czuk-Polubiec","raw_affiliation_strings":["Independent Researcher, Poland"],"affiliations":[{"raw_affiliation_string":"Independent Researcher, Poland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012596722","display_name":"Aneta Wr\u00f3blewska","orcid":"https://orcid.org/0000-0001-9724-4586"},"institutions":[{"id":"https://openalex.org/I174183983","display_name":"Maria Curie-Sk\u0142odowska University","ror":"https://ror.org/015h0qg34","country_code":"PL","type":"education","lineage":["https://openalex.org/I174183983"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Aneta Wr\u00f3blewska","raw_affiliation_strings":["Maria Curie-Sk\u0142odowska University, Poland"],"affiliations":[{"raw_affiliation_string":"Maria Curie-Sk\u0142odowska University, Poland","institution_ids":["https://openalex.org/I174183983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110362085","display_name":"Monika Polak","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Monika Katarzyna Polak","raw_affiliation_strings":["Rochester Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011249086","display_name":"Eustrat Zhupa","orcid":null},"institutions":[{"id":"https://openalex.org/I5388228","display_name":"University of Rochester","ror":"https://ror.org/022kthw22","country_code":"US","type":"education","lineage":["https://openalex.org/I5388228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eustrat Zhupa","raw_affiliation_strings":["University of Rochester, USA"],"affiliations":[{"raw_affiliation_string":"University of Rochester, USA","institution_ids":["https://openalex.org/I5388228"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5031076725"],"corresponding_institution_ids":[],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":1.2601,"has_fulltext":true,"cited_by_count":19,"citation_normalized_percentile":{"value":0.84753535,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6542896628379822},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4968116581439972},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38488709926605225}],"concepts":[{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6542896628379822},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4968116581439972},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38488709926605225}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2019/2137561","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/2137561","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/2137561.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:14a10fb60e6541fb96bb1482d9b4745d","is_oa":true,"landing_page_url":"https://doaj.org/article/14a10fb60e6541fb96bb1482d9b4745d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2019/2137561","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/2137561","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/2137561.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2930422556.pdf","grobid_xml":"https://content.openalex.org/works/W2930422556.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W1699105","https://openalex.org/W181128013","https://openalex.org/W1488277370","https://openalex.org/W1542020576","https://openalex.org/W1582711866","https://openalex.org/W1618496890","https://openalex.org/W1777865687","https://openalex.org/W1822563368","https://openalex.org/W1964205483","https://openalex.org/W2012646342","https://openalex.org/W2395702535","https://openalex.org/W2480127678","https://openalex.org/W2616926969"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109"],"abstract_inverted_index":{"The":[0,69,93],"main":[1,32],"purpose":[2],"of":[3,16,22,37,45,71,99,126,140],"this":[4,127],"paper":[5],"is":[6,62,74,96,130],"to":[7,52,143],"introduce":[8],"stream":[9],"ciphers":[10],"with":[11,48,103,119],"the":[12,30,65,72,100,105,120,124,141],"nonbijective":[13],"encryption":[14,39,110],"function":[15],"multivariate":[17,38],"nature":[18],"constructed":[19],"in":[20,117],"terms":[21],"algebraic":[23],"graph":[24],"theory.":[25],"More":[26],"precisely,":[27],"we":[28],"describe":[29],"two":[31],"symmetric":[33],"algorithms":[34],"for":[35],"creation":[36],"transformations":[40],"based":[41],"on":[42],"three":[43],"families":[44],"bipartite":[46],"graphs":[47],"partition":[49],"sets":[50],"isomorphic":[51],"<mml:math":[53,58,75],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[54,59,76,87],"id=\"M1\"><mml:mrow><mml:msup><mml:mrow><mml:mi":[55],"mathvariant=\"double-struck\">K</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup></mml:mrow></mml:math>,":[56],"where":[57,108],"id=\"M2\"><mml:mrow><mml:mi":[60],"mathvariant=\"double-struck\">K</mml:mi></mml:mrow></mml:math>":[61],"selected":[63],"as":[64],"finite":[66],"commutative":[67],"ring.":[68],"plainspace":[70],"algorithm":[73,95],"id=\"M3\"><mml:mi":[77],"mathvariant=\"normal\">\u03a9</mml:mi><mml:mo>=</mml:mo><mml:mo":[78],"stretchy=\"false\">{</mml:mo><mml:mi>x</mml:mi><mml:mrow><mml:mo>\u2223</mml:mo></mml:mrow><mml:mrow><mml:mo":[79],"stretchy=\"false\">\u2211</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>x</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>\u2208</mml:mo><mml:msup><mml:mrow><mml:mi":[80],"mathvariant=\"double-struck\">K</mml:mi></mml:mrow><mml:mrow><mml:mo>\u204e</mml:mo></mml:mrow></mml:msup></mml:mrow></mml:mrow><mml:mo>,</mml:mo><mml:mo>":[81],"</mml:mo><mml:mo>":[82],"</mml:mo><mml:mi>x</mml:mi><mml:mo>\u2208</mml:mo><mml:msup><mml:mrow><mml:mi":[83],"mathvariant=\"double-struck\">K</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo":[84],"stretchy=\"false\">}</mml:mo><mml:mo>\u2282</mml:mo><mml:msup><mml:mrow><mml:mi":[85],"mathvariant=\"double-struck\">K</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msup><mml:mo>,</mml:mo></mml:math><mml:math":[86],"id=\"M4\"><mml:mi":[88],"mathvariant=\"normal\">\u03a9</mml:mi><mml:mo>\u2245</mml:mo><mml:msup><mml:mrow><mml:mi":[89],"mathvariant=\"double-struck\">K</mml:mi></mml:mrow><mml:mrow><mml:mo>\u204e</mml:mo></mml:mrow></mml:msup><mml:mo>\u00d7</mml:mo><mml:msup><mml:mrow><mml:mi":[90],"mathvariant=\"double-struck\">K</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mo>-</mml:mo><mml:mn":[91],"mathvariant=\"normal\">1</mml:mn></mml:mrow></mml:msup><mml:mo>.</mml:mo></mml:math>":[92],"second":[94],"a":[97],"generalization":[98],"first":[101],"one":[102],"using":[104],"jump":[106],"operator,":[107],"generalized":[109,128],"map":[111,129],"has":[112],"an":[113],"essentially":[114],"higher":[115],"degree":[116,125],"comparison":[118],"previous":[121],"version.":[122],"Moreover,":[123],"not":[131],"bounded":[132],"by":[133],"some":[134],"constant.":[135],"This":[136],"property":[137],"guarantees":[138],"resistance":[139],"cipher":[142],"linearization":[144],"attacks.":[145]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
