{"id":"https://openalex.org/W2896948810","doi":"https://doi.org/10.3390/cryptography2040031","title":"The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF","display_name":"The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2896948810","doi":"https://doi.org/10.3390/cryptography2040031","mag":"2896948810"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography2040031","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040031","pdf_url":"https://www.mdpi.com/2410-387X/2/4/31/pdf?version=1539589445","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/2/4/31/pdf?version=1539589445","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001435389","display_name":"Ted Krovetz","orcid":"https://orcid.org/0000-0003-3640-9134"},"institutions":[{"id":"https://openalex.org/I43522216","display_name":"California State University, Sacramento","ror":"https://ror.org/03e26wv14","country_code":"US","type":"education","lineage":["https://openalex.org/I43522216"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ted Krovetz","raw_affiliation_strings":["Computer Science Department, California State University, Sacramento, CA 95819, USA"],"raw_orcid":"https://orcid.org/0000-0003-3640-9134","affiliations":[{"raw_affiliation_string":"Computer Science Department, California State University, Sacramento, CA 95819, USA","institution_ids":["https://openalex.org/I43522216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5001435389"],"corresponding_institution_ids":["https://openalex.org/I43522216"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.1692,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61239479,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":"4","first_page":"31","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7483291029930115},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7135549783706665},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6001304388046265},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.5633174180984497},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5521185398101807},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.5302569270133972},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.48103219270706177},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.45075154304504395},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44166359305381775},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4106888771057129},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39314156770706177},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.2715960741043091},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2295817732810974},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16536012291908264},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15674442052841187}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7483291029930115},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7135549783706665},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6001304388046265},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.5633174180984497},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5521185398101807},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.5302569270133972},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.48103219270706177},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.45075154304504395},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44166359305381775},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4106888771057129},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39314156770706177},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2715960741043091},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2295817732810974},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16536012291908264},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15674442052841187}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography2040031","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040031","pdf_url":"https://www.mdpi.com/2410-387X/2/4/31/pdf?version=1539589445","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:82d73ad902ad4834abdf4e74c236ff49","is_oa":true,"landing_page_url":"https://doaj.org/article/82d73ad902ad4834abdf4e74c236ff49","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 2, Iss 4, p 31 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/2/4/31/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography2040031","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography2040031","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040031","pdf_url":"https://www.mdpi.com/2410-387X/2/4/31/pdf?version=1539589445","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5579416086","display_name":null,"funder_award_id":"1314592","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332867","display_name":"California State University, Sacramento","ror":"https://ror.org/03e26wv14"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2896948810.pdf","grobid_xml":"https://content.openalex.org/works/W2896948810.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W26087452","https://openalex.org/W112964067","https://openalex.org/W1504211573","https://openalex.org/W1507330542","https://openalex.org/W1552695147","https://openalex.org/W1567501709","https://openalex.org/W1578627459","https://openalex.org/W1655844021","https://openalex.org/W1763079358","https://openalex.org/W1855109561","https://openalex.org/W1895952394","https://openalex.org/W2475752160","https://openalex.org/W2484860292","https://openalex.org/W2499339068","https://openalex.org/W2730675851","https://openalex.org/W2794798192","https://openalex.org/W4205238976","https://openalex.org/W4214882369","https://openalex.org/W4237128443","https://openalex.org/W4240505175","https://openalex.org/W6764405564"],"related_works":["https://openalex.org/W2988803943","https://openalex.org/W3195404686","https://openalex.org/W2381843700","https://openalex.org/W2393423895","https://openalex.org/W2036520688","https://openalex.org/W1565658545","https://openalex.org/W2610780560","https://openalex.org/W2385517711","https://openalex.org/W1566979565","https://openalex.org/W2072615570"],"abstract_inverted_index":{"Two":[0],"of":[1,5,21,41,55,60,98],"the":[2,9,13,38,96,108],"fastest":[3],"types":[4,40],"cryptographic":[6],"algorithms":[7,42],"are":[8,18],"stream":[10],"cipher":[11],"and":[12,56,94,106],"almost-universal":[14],"hash":[15],"function.":[16],"There":[17],"secure":[19],"examples":[20],"each":[22],"that":[23,50],"process":[24],"data":[25],"in":[26,43,70,111],"software":[27],"using":[28],"less":[29],"than":[30],"one":[31],"CPU":[32],"cycle":[33],"per":[34],"byte.":[35],"Hashstream":[36,93],"combines":[37],"two":[39],"a":[44,48],"straightforward":[45],"manner":[46],"yielding":[47],"PRF":[49],"can":[51],"both":[52],"consume":[53],"inputs":[54],"produce":[57],"pseudorandom":[58],"outputs":[59],"any":[61],"desired":[62],"length.":[63],"The":[64,82],"result":[65],"is":[66],"an":[67,100],"object":[68],"useful":[69],"many":[71],"contexts:":[72],"authentication,":[73],"encryption,":[74,76],"authenticated":[75],"random":[77],"generation,":[78,80],"mask":[79],"etc.":[81],"HS1-SIV":[83],"authenticated-encryption":[84],"algorithm\u2014a":[85],"CAESAR":[86],"competition":[87],"second":[88],"round":[89],"selection\u2014was":[90],"based":[91],"on":[92],"showed":[95],"promise":[97],"such":[99],"approach":[101],"by":[102],"having":[103],"provable":[104],"security":[105],"topping":[107],"speed":[109],"charts":[110],"several":[112],"test":[113],"configurations.":[114]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
