{"id":"https://openalex.org/W1968878564","doi":"https://doi.org/10.2478/v10006-010-0030-6","title":"Scalable PP-1 block cipher","display_name":"Scalable PP-1 block cipher","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W1968878564","doi":"https://doi.org/10.2478/v10006-010-0030-6","mag":"1968878564"},"language":"en","primary_location":{"id":"doi:10.2478/v10006-010-0030-6","is_oa":true,"landing_page_url":"https://doi.org/10.2478/v10006-010-0030-6","pdf_url":null,"source":{"id":"https://openalex.org/S117679522","display_name":"International Journal of Applied Mathematics and Computer Science","issn_l":"1641-876X","issn":["1641-876X","2083-8492"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Applied Mathematics and Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.2478/v10006-010-0030-6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053555611","display_name":"Krzysztof Bucholc","orcid":null},"institutions":[{"id":"https://openalex.org/I46597724","display_name":"Pozna\u0144 University of Technology","ror":"https://ror.org/00p7p3302","country_code":"PL","type":"education","lineage":["https://openalex.org/I46597724"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Krzysztof Bucholc","raw_affiliation_strings":["Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#","institution_ids":["https://openalex.org/I46597724"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040933061","display_name":"Krzysztof Chmiel","orcid":null},"institutions":[{"id":"https://openalex.org/I46597724","display_name":"Pozna\u0144 University of Technology","ror":"https://ror.org/00p7p3302","country_code":"PL","type":"education","lineage":["https://openalex.org/I46597724"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Krzysztof Chmiel","raw_affiliation_strings":["Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#","institution_ids":["https://openalex.org/I46597724"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079594612","display_name":"Anna Grocholewska-Czury\u0142o","orcid":null},"institutions":[{"id":"https://openalex.org/I46597724","display_name":"Pozna\u0144 University of Technology","ror":"https://ror.org/00p7p3302","country_code":"PL","type":"education","lineage":["https://openalex.org/I46597724"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Anna Grocholewska-Czury\u0142o","raw_affiliation_strings":["Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#","institution_ids":["https://openalex.org/I46597724"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091199183","display_name":"Ewa Idzikowska","orcid":null},"institutions":[{"id":"https://openalex.org/I46597724","display_name":"Pozna\u0144 University of Technology","ror":"https://ror.org/00p7p3302","country_code":"PL","type":"education","lineage":["https://openalex.org/I46597724"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Ewa Idzikowska","raw_affiliation_strings":["Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#","institution_ids":["https://openalex.org/I46597724"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006488455","display_name":"Izabela Janicka-Lipska","orcid":"https://orcid.org/0000-0001-9884-9018"},"institutions":[{"id":"https://openalex.org/I46597724","display_name":"Pozna\u0144 University of Technology","ror":"https://ror.org/00p7p3302","country_code":"PL","type":"education","lineage":["https://openalex.org/I46597724"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Izabela Janicka-Lipska","raw_affiliation_strings":["Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#","institution_ids":["https://openalex.org/I46597724"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085956787","display_name":"Janusz Stok\u0142osa","orcid":"https://orcid.org/0000-0003-1478-6844"},"institutions":[{"id":"https://openalex.org/I46597724","display_name":"Pozna\u0144 University of Technology","ror":"https://ror.org/00p7p3302","country_code":"PL","type":"education","lineage":["https://openalex.org/I46597724"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Janusz Stok\u0142osa","raw_affiliation_strings":["Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute of Control and Information Engineering, Pozna\u0144 University of Technology, pl. Marii Sk\u0142odowskiej-Curie 5, 60-965 Pozna\u0144, Poland#TAB#","institution_ids":["https://openalex.org/I46597724"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5053555611"],"corresponding_institution_ids":["https://openalex.org/I46597724"],"apc_list":{"value":4080,"currency":"PLN","value_usd":1100},"apc_paid":{"value":4080,"currency":"PLN","value_usd":1100},"fwci":3.2515,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.91954023,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"20","issue":"2","first_page":"401","last_page":"411"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7479290962219238},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7377434968948364},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.6294903755187988},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.6174545288085938},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.6094458103179932},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.5871041417121887},{"id":"https://openalex.org/keywords/two-square-cipher","display_name":"Two-square cipher","score":0.5679565072059631},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.44956207275390625},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.4323084354400635},{"id":"https://openalex.org/keywords/cbc-mac","display_name":"CBC-MAC","score":0.4275773763656616},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.40078556537628174},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3911193013191223},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3469889163970947},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34329184889793396},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33435380458831787},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20543426275253296},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17256081104278564},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09120610356330872}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7479290962219238},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7377434968948364},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.6294903755187988},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.6174545288085938},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.6094458103179932},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.5871041417121887},{"id":"https://openalex.org/C60153865","wikidata":"https://www.wikidata.org/wiki/Q1124307","display_name":"Two-square cipher","level":5,"score":0.5679565072059631},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.44956207275390625},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.4323084354400635},{"id":"https://openalex.org/C156529985","wikidata":"https://www.wikidata.org/wiki/Q2736227","display_name":"CBC-MAC","level":4,"score":0.4275773763656616},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.40078556537628174},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3911193013191223},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3469889163970947},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34329184889793396},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33435380458831787},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20543426275253296},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17256081104278564},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09120610356330872}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2478/v10006-010-0030-6","is_oa":true,"landing_page_url":"https://doi.org/10.2478/v10006-010-0030-6","pdf_url":null,"source":{"id":"https://openalex.org/S117679522","display_name":"International Journal of Applied Mathematics and Computer Science","issn_l":"1641-876X","issn":["1641-876X","2083-8492"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Applied Mathematics and Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:zbc.uz.zgora.pl:46861","is_oa":true,"landing_page_url":"https://zbc.uz.zgora.pl/dlibra/docmetadata?showContent=true&id=46861","pdf_url":"http://zbc.uz.zgora.pl/Content/46861/AMCS_2010_20_2_15.pdf","source":{"id":"https://openalex.org/S4306400400","display_name":"Digital library of Zielona Gora (University of Zielona G\u00f3ra)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I46305939","host_organization_name":"University of Zielona G\u00f3ra","host_organization_lineage":["https://openalex.org/I46305939"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.amcs.uz.zgora.pl/?action=paper&paper=500","raw_type":"artyku\u0142"}],"best_oa_location":{"id":"doi:10.2478/v10006-010-0030-6","is_oa":true,"landing_page_url":"https://doi.org/10.2478/v10006-010-0030-6","pdf_url":null,"source":{"id":"https://openalex.org/S117679522","display_name":"International Journal of Applied Mathematics and Computer Science","issn_l":"1641-876X","issn":["1641-876X","2083-8492"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Applied Mathematics and Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W23448464","https://openalex.org/W46208116","https://openalex.org/W129825949","https://openalex.org/W1182320003","https://openalex.org/W1519215751","https://openalex.org/W1523812951","https://openalex.org/W1527031884","https://openalex.org/W1527545029","https://openalex.org/W1542020576","https://openalex.org/W2149702917","https://openalex.org/W2154667225","https://openalex.org/W2170601728","https://openalex.org/W2286252768","https://openalex.org/W2475175210","https://openalex.org/W2505253445","https://openalex.org/W6685103288","https://openalex.org/W6695911983"],"related_works":["https://openalex.org/W2531227589","https://openalex.org/W2618635052","https://openalex.org/W2244520036","https://openalex.org/W3022854131","https://openalex.org/W2380026892","https://openalex.org/W2377859209","https://openalex.org/W2087378394","https://openalex.org/W2533615946","https://openalex.org/W4237583475","https://openalex.org/W3150607784"],"abstract_inverted_index":{"Scalable":[0],"PP-1":[1,9,60,75],"block":[2],"cipher":[3,10,30,61,76],"A":[4],"totally":[5],"involutional,":[6],"highly":[7],"scalable":[8],"is":[11,31,47,77,92],"proposed,":[12],"evaluated":[13,79],"and":[14,21,25,67,85,102],"discussed.":[15,94],"Having":[16],"very":[17],"low":[18],"memory":[19],"requirements":[20],"using":[22],"only":[23],"simple":[24],"fast":[26],"arithmetic":[27],"operations,":[28],"the":[29,41,44,74],"aimed":[32],"at":[33],"platforms":[34],"with":[35,80,104],"limited":[36],"resources,":[37],"e.g.,":[38],"smartcards.":[39],"At":[40],"core":[42],"of":[43,59,73,106],"cipher's":[45],"processing":[46,96],"a":[48],"carefully":[49],"designed":[50],"S-box.":[51],"The":[52,71],"paper":[53],"discusses":[54],"in":[55],"detail":[56],"all":[57],"aspects":[58],"design":[62],"including":[63],"S-box":[64],"construction,":[65],"permutation":[66],"round":[68],"key":[69],"scheduling.":[70],"quality":[72],"also":[78,93],"respect":[81],"to":[82],"linear":[83],"cryptanalysis":[84],"other":[86,107],"attacks.":[87],"PP-1's":[88],"concurrent":[89],"error":[90],"detection":[91],"Some":[95],"speed":[97],"test":[98],"results":[99],"are":[100],"given":[101],"compared":[103],"those":[105],"ciphers.":[108]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
