{"id":"https://openalex.org/W4391578211","doi":"https://doi.org/10.3233/jifs-236998","title":"Enhancing block cipher security with key-dependent random XOR tables generated via hadamard matrices and Sudoku game","display_name":"Enhancing block cipher security with key-dependent random XOR tables generated via hadamard matrices and Sudoku game","publication_year":2024,"publication_date":"2024-02-06","ids":{"openalex":"https://openalex.org/W4391578211","doi":"https://doi.org/10.3233/jifs-236998"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-236998","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-236998","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108899298","display_name":"Dinh Linh Hoang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Dinh Linh Hoang","raw_affiliation_strings":["Institute of Cryptographic Science and Technology, Lang Ha, Dong Da, Hanoi, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Cryptographic Science and Technology, Lang Ha, Dong Da, Hanoi, Vietnam","institution_ids":["https://openalex.org/I4210155035"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052522935","display_name":"Tr\u1ea7n Th\u1ecb L\u01b0\u1ee3ng","orcid":"https://orcid.org/0000-0001-9080-6048"},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Tran Thi Luong","raw_affiliation_strings":["Academy of Cryptography Techniques, Tan Trieu, Thanh Tri, Hanoi, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Academy of Cryptography Techniques, Tan Trieu, Thanh Tri, Hanoi, Vietnam","institution_ids":["https://openalex.org/I4210155035"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052522935"],"corresponding_institution_ids":["https://openalex.org/I4210155035"],"apc_list":null,"apc_paid":null,"fwci":0.1919,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.44680352,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"46","issue":"4","first_page":"7805","last_page":"7821"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6749135255813599},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6087103486061096},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.596272885799408},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.563267707824707},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5582495927810669},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5415648818016052},{"id":"https://openalex.org/keywords/bitwise-operation","display_name":"Bitwise operation","score":0.5360496640205383},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5202399492263794},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.474132776260376},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.44131559133529663},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43862223625183105},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.4352490305900574},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.4196472764015198},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.301249623298645},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.24154284596443176},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15050724148750305}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6749135255813599},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6087103486061096},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.596272885799408},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.563267707824707},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5582495927810669},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5415648818016052},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.5360496640205383},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5202399492263794},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.474132776260376},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.44131559133529663},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43862223625183105},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.4352490305900574},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.4196472764015198},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.301249623298645},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.24154284596443176},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15050724148750305},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-236998","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-236998","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1564846034","https://openalex.org/W1572300106","https://openalex.org/W1987805576","https://openalex.org/W1995875735","https://openalex.org/W2069489561","https://openalex.org/W2156775578","https://openalex.org/W2325743495","https://openalex.org/W2594881615","https://openalex.org/W2725380599","https://openalex.org/W2970884539","https://openalex.org/W3023312227","https://openalex.org/W3023674252","https://openalex.org/W3029625679","https://openalex.org/W3032899641","https://openalex.org/W3112799620","https://openalex.org/W3126295544","https://openalex.org/W3176777975","https://openalex.org/W3184143339","https://openalex.org/W3214975904","https://openalex.org/W4213300359","https://openalex.org/W4321369612","https://openalex.org/W4361855749","https://openalex.org/W4379531741","https://openalex.org/W4386041154","https://openalex.org/W6740398225"],"related_works":["https://openalex.org/W2125214861","https://openalex.org/W2522069694","https://openalex.org/W2059218952","https://openalex.org/W2910464690","https://openalex.org/W2889511553","https://openalex.org/W1798672631","https://openalex.org/W2964609758","https://openalex.org/W3011345142","https://openalex.org/W4280572121","https://openalex.org/W2163370018"],"abstract_inverted_index":{"The":[0],"XOR":[1,30,67,94,155],"operator":[2],"is":[3,26,47,71],"a":[4,35,119],"simple":[5],"yet":[6,59],"crucial":[7],"computation":[8],"in":[9,13,20,174],"computer":[10],"science,":[11],"especially":[12],"cryptography.":[14],"In":[15,52],"symmetric":[16],"cryptographic":[17],"schemes,":[18],"particularly":[19],"block":[21,45,98],"ciphers,":[22],"the":[23,42,74,82,93,106,112,124,127,140,152,157],"AddRoundKey":[24],"transformation":[25,95],"commonly":[27],"used":[28],"to":[29,40,48,91,105,110,151],"an":[31],"internal":[32],"state":[33],"with":[34],"round":[36],"key.":[37],"One":[38,69],"method":[39],"enhance":[41],"security":[43,120],"of":[44,126],"ciphers":[46],"diversify":[49],"this":[50,53],"transformation.":[51],"paper,":[54],"we":[55,88,101,117],"propose":[56],"some":[57,175],"straightforward":[58],"highly":[60],"effective":[61],"techniques":[62],"for":[63,96],"generating":[64],"t-bit":[65],"random":[66,154],"tables.":[68],"approach":[70],"based":[72,138,145],"on":[73,139,146],"Hadamard":[75],"matrix,":[76],"while":[77],"another":[78],"draws":[79],"inspiration":[80],"from":[81],"popular":[83],"intellectual":[84],"game":[85],"Sudoku.":[86],"Additionally,":[87],"introduce":[89],"algorithms":[90],"animate":[92],"generalized":[97],"ciphers.":[99],"Specifically,":[100],"apply":[102],"our":[103],"findings":[104],"AES":[107,114,130,159],"encryption":[108],"standard":[109],"present":[111],"key-dependent":[113,129,153,158],"algorithm.":[115],"Furthermore,":[116],"conduct":[118],"analysis":[121],"and":[122,143,168],"assess":[123],"randomness":[125],"proposed":[128],"algorithm":[131,160],"using":[132],"NIST":[133,147],"SP":[134,148],"800-22,":[135],"Shannon":[136],"entropy":[137],"ENT":[141],"tool,":[142],"min-entropy":[144],"800-90B.":[149],"Thanks":[150],"tables,":[156],"have":[161],"become":[162],"much":[163],"more":[164],"secure":[165],"than":[166,178],"AES,":[167],"they":[169],"also":[170],"achieve":[171],"better":[172],"results":[173],"statistical":[176],"standards":[177],"AES.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-21T09:19:25.381259","created_date":"2025-10-10T00:00:00"}
