{"id":"https://openalex.org/W2902690684","doi":"https://doi.org/10.23919/eusipco.2018.8553449","title":"A New Stream Cipher Based on Nonlinear Dynamic System","display_name":"A New Stream Cipher Based on Nonlinear Dynamic System","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2902690684","doi":"https://doi.org/10.23919/eusipco.2018.8553449","mag":"2902690684"},"language":"en","primary_location":{"id":"doi:10.23919/eusipco.2018.8553449","is_oa":false,"landing_page_url":"https://doi.org/10.23919/eusipco.2018.8553449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 26th European Signal Processing Conference (EUSIPCO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018743893","display_name":"O. Mannai","orcid":null},"institutions":[{"id":"https://openalex.org/I63596082","display_name":"Tunis El Manar University","ror":"https://ror.org/029cgt552","country_code":"TN","type":"education","lineage":["https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"O. Mannai","raw_affiliation_strings":["Risc Laboratory, Tunis El Manar University, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Risc Laboratory, Tunis El Manar University, Tunis, Tunisia","institution_ids":["https://openalex.org/I63596082"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029579736","display_name":"Rabei Becheikh","orcid":null},"institutions":[{"id":"https://openalex.org/I63596082","display_name":"Tunis El Manar University","ror":"https://ror.org/029cgt552","country_code":"TN","type":"education","lineage":["https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"R. Becheikh","raw_affiliation_strings":["Risc Laboratory, Tunis El Manar University, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Risc Laboratory, Tunis El Manar University, Tunis, Tunisia","institution_ids":["https://openalex.org/I63596082"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064186375","display_name":"Rhouma Rhouma","orcid":"https://orcid.org/0000-0002-5715-4110"},"institutions":[{"id":"https://openalex.org/I63596082","display_name":"Tunis El Manar University","ror":"https://ror.org/029cgt552","country_code":"TN","type":"education","lineage":["https://openalex.org/I63596082"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"R. Rhouma","raw_affiliation_strings":["Risc Laboratory, Tunis El Manar University, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Risc Laboratory, Tunis El Manar University, Tunis, Tunisia","institution_ids":["https://openalex.org/I63596082"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018743893"],"corresponding_institution_ids":["https://openalex.org/I63596082"],"apc_list":null,"apc_paid":null,"fwci":0.5223,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71808452,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"316","last_page":"320"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.9567134976387024},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.6873507499694824},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6660065054893494},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.657670259475708},{"id":"https://openalex.org/keywords/affine-cipher","display_name":"Affine cipher","score":0.6475429534912109},{"id":"https://openalex.org/keywords/linear-feedback-shift-register","display_name":"Linear feedback shift register","score":0.6036945581436157},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.5596069097518921},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.5063778162002563},{"id":"https://openalex.org/keywords/shift-register","display_name":"Shift register","score":0.4888255000114441},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4729575514793396},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4630710184574127},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4561454951763153},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4381105899810791},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.4330362379550934},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.4284325838088989},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41587546467781067},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3414266109466553},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3391559422016144},{"id":"https://openalex.org/keywords/triple-des","display_name":"Triple DES","score":0.24635463953018188},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2146378755569458},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12574440240859985},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.08622938394546509},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07958555221557617}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.9567134976387024},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.6873507499694824},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6660065054893494},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.657670259475708},{"id":"https://openalex.org/C57669260","wikidata":"https://www.wikidata.org/wiki/Q382486","display_name":"Affine cipher","level":5,"score":0.6475429534912109},{"id":"https://openalex.org/C159862308","wikidata":"https://www.wikidata.org/wiki/Q681101","display_name":"Linear feedback shift register","level":4,"score":0.6036945581436157},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.5596069097518921},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.5063778162002563},{"id":"https://openalex.org/C49654631","wikidata":"https://www.wikidata.org/wiki/Q746165","display_name":"Shift register","level":3,"score":0.4888255000114441},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4729575514793396},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4630710184574127},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4561454951763153},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4381105899810791},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.4330362379550934},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.4284325838088989},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41587546467781067},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3414266109466553},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3391559422016144},{"id":"https://openalex.org/C90897222","wikidata":"https://www.wikidata.org/wiki/Q134983","display_name":"Triple DES","level":4,"score":0.24635463953018188},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2146378755569458},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12574440240859985},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.08622938394546509},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07958555221557617},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/eusipco.2018.8553449","is_oa":false,"landing_page_url":"https://doi.org/10.23919/eusipco.2018.8553449","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 26th European Signal Processing Conference (EUSIPCO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W170584983","https://openalex.org/W298899479","https://openalex.org/W1513405660","https://openalex.org/W1517403092","https://openalex.org/W1554090281","https://openalex.org/W1625863036","https://openalex.org/W1878371132","https://openalex.org/W1963898916","https://openalex.org/W2000093475","https://openalex.org/W2005687635","https://openalex.org/W2062341395","https://openalex.org/W2092152122","https://openalex.org/W2098400079","https://openalex.org/W2133084413","https://openalex.org/W2763534418","https://openalex.org/W2965592331","https://openalex.org/W6606961867","https://openalex.org/W6633355274","https://openalex.org/W6679761564"],"related_works":["https://openalex.org/W2551608712","https://openalex.org/W2375692279","https://openalex.org/W2124059393","https://openalex.org/W2403423567","https://openalex.org/W2615464719","https://openalex.org/W2132652565","https://openalex.org/W1784733384","https://openalex.org/W3104811160","https://openalex.org/W2150486630","https://openalex.org/W2902690684"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"introduce":[4],"a":[5,24],"new":[6],"synchronous":[7],"stream":[8,105],"cipher.":[9],"The":[10,36],"core":[11],"of":[12,30,50],"the":[13,16,80,85,90],"cipher":[14,37,106],"is":[15,55,87],"Ikeda":[17],"system":[18],"which":[19],"can":[20],"be":[21,95],"seen":[22],"as":[23,41],"Nonlinear":[25],"Feedback":[26],"Shift":[27],"Register":[28],"(NLFSR)":[29],"length":[31],"7":[32],"plus":[33],"one":[34],"memory.":[35],"takes":[38],"256-bit":[39],"key":[40,54],"input":[42],"and":[43,74,101],"generates":[44],"in":[45,89],"each":[46],"iteration":[47],"an":[48],"output":[49,65,81],"16-bits.":[51],"A":[52,67],"single":[53],"allowed":[56],"to":[57,60,103],"generate":[58],"up":[59],"2":[61],"<sup":[62],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[63],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">64</sup>":[64],"bits.":[66],"security":[68],"analysis":[69],"has":[70,76],"been":[71,77],"carried":[72],"out":[73],"it":[75],"showed":[78],"that":[79,92],"sequence":[82,100],"produced":[83],"by":[84],"scheme":[86],"pseudorandom":[88],"sense":[91],"they":[93],"cannot":[94],"distinguished":[96],"from":[97],"truly":[98],"random":[99],"resist":[102],"well-known":[104],"attacks.":[107]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
