{"id":"https://openalex.org/W4385879237","doi":"https://doi.org/10.3390/cryptography7030041","title":"Matrix Encryption Walks for Lightweight Cryptography","display_name":"Matrix Encryption Walks for Lightweight Cryptography","publication_year":2023,"publication_date":"2023-08-16","ids":{"openalex":"https://openalex.org/W4385879237","doi":"https://doi.org/10.3390/cryptography7030041"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7030041","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030041","pdf_url":"https://www.mdpi.com/2410-387X/7/3/41/pdf?version=1692186390","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/3/41/pdf?version=1692186390","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044480272","display_name":"Aeryn Dunmore","orcid":"https://orcid.org/0000-0002-7113-380X"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Aeryn Dunmore","raw_affiliation_strings":["Cybersecurity Lab, Massey University, SH17, Albany, Auckland 0632, New Zealand"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Lab, Massey University, SH17, Albany, Auckland 0632, New Zealand","institution_ids":["https://openalex.org/I51158804"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091977348","display_name":"Juliet Samandari","orcid":"https://orcid.org/0000-0003-1606-6584"},"institutions":[{"id":"https://openalex.org/I185492890","display_name":"University of Canterbury","ror":"https://ror.org/03y7q9t39","country_code":"NZ","type":"education","lineage":["https://openalex.org/I185492890"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Juliet Samandari","raw_affiliation_strings":["Department of Computer Science and Software Engineering, University of Canterbury, Corner Science and Engineering Roads, Upper Riccarton, Christchurch 8041, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, University of Canterbury, Corner Science and Engineering Roads, Upper Riccarton, Christchurch 8041, New Zealand","institution_ids":["https://openalex.org/I185492890"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007979944","display_name":"Julian Jang\u2010Jaccard","orcid":"https://orcid.org/0000-0002-1002-057X"},"institutions":[{"id":"https://openalex.org/I51158804","display_name":"Massey University","ror":"https://ror.org/052czxv31","country_code":"NZ","type":"education","lineage":["https://openalex.org/I51158804"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Julian Jang-Jaccard","raw_affiliation_strings":["Cybersecurity Lab, Massey University, SH17, Albany, Auckland 0632, New Zealand"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Lab, Massey University, SH17, Albany, Auckland 0632, New Zealand","institution_ids":["https://openalex.org/I51158804"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044480272"],"corresponding_institution_ids":["https://openalex.org/I51158804"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.6959,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.75770872,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"7","issue":"3","first_page":"41","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7090321183204651},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6997868418693542},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.6156203746795654},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6140627264976501},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5974360704421997},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.5716157555580139},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.5673219561576843},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5102577209472656},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4893169105052948},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46264398097991943},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.45265525579452515},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.4103417992591858},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.40134337544441223},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2666740417480469},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21518564224243164},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13777774572372437}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7090321183204651},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6997868418693542},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.6156203746795654},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6140627264976501},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5974360704421997},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.5716157555580139},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.5673219561576843},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5102577209472656},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4893169105052948},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46264398097991943},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.45265525579452515},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.4103417992591858},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40134337544441223},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2666740417480469},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21518564224243164},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13777774572372437}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography7030041","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030041","pdf_url":"https://www.mdpi.com/2410-387X/7/3/41/pdf?version=1692186390","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fc7564305b3448a3b250cd13957b05ea","is_oa":true,"landing_page_url":"https://doaj.org/article/fc7564305b3448a3b250cd13957b05ea","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 3, p 41 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7030041","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030041","pdf_url":"https://www.mdpi.com/2410-387X/7/3/41/pdf?version=1692186390","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385879237.pdf"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1996462091","https://openalex.org/W2003164853","https://openalex.org/W2037478157","https://openalex.org/W2043250695","https://openalex.org/W2076397729","https://openalex.org/W2084652510","https://openalex.org/W2128546931","https://openalex.org/W2547188081","https://openalex.org/W2552135499","https://openalex.org/W2585696635","https://openalex.org/W2594530663","https://openalex.org/W2610547191","https://openalex.org/W2619579631","https://openalex.org/W2797891910","https://openalex.org/W2952234193","https://openalex.org/W2993853848","https://openalex.org/W2996486631","https://openalex.org/W2998817456","https://openalex.org/W3013756825","https://openalex.org/W3215994486","https://openalex.org/W4220663304","https://openalex.org/W4234583446","https://openalex.org/W4243971583","https://openalex.org/W4256177487","https://openalex.org/W4281692726","https://openalex.org/W4312225702","https://openalex.org/W6635643323","https://openalex.org/W6661595405","https://openalex.org/W6750235969"],"related_works":["https://openalex.org/W2069306548","https://openalex.org/W4388488734","https://openalex.org/W2564633714","https://openalex.org/W2353983817","https://openalex.org/W2545608624","https://openalex.org/W3113293483","https://openalex.org/W1995502611","https://openalex.org/W3005779010","https://openalex.org/W2522187453","https://openalex.org/W3118382193"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"propose":[4],"a":[5,64],"new":[6],"symmetric":[7],"stream":[8],"cipher":[9],"encryption":[10,61,173],"algorithm":[11,62,76],"based":[12],"on":[13],"Graph":[14],"Walks":[15,22],"and":[16,29,48,63,88,100,116,122,136,140,168],"2-dimensional":[17],"matrices,":[18],"called":[19],"Matrix":[20],"Encryption":[21],"(MEW).":[23],"We":[24,51,124,148],"offer":[25],"example":[26],"Key":[27],"Matrices":[28],"show":[30],"the":[31,34,54,60,68,106,111,127,152],"efficiency":[32],"of":[33,56,67,70,165],"proposed":[35,72,118],"method,":[36],"which":[37,162],"operates":[38],"in":[39,95],"linear":[40],"complexity":[41],"with":[42,105],"an":[43],"extremely":[44],"large":[45],"key":[46,101,130],"space":[47],"low-resource":[49,80],"requirements.":[50],"also":[52,150],"provide":[53],"Proof":[55],"Concept":[57],"code":[58],"for":[59,79,154,171],"detailed":[65],"analysis":[66],"security":[69],"our":[71],"MEW.":[73],"The":[74,97],"MEW":[75,142],"is":[77,89],"designed":[78],"environments":[81],"such":[82,159],"as":[83,160],"IoT":[84],"or":[85],"smart":[86],"devices":[87],"therefore":[90],"intended":[91],"to":[92,109],"be":[93],"simple":[94],"operation.":[96],"encryption,":[98],"decryption,":[99],"generation":[102],"time,":[103],"along":[104],"bytes":[107],"required":[108],"store":[110],"key,":[112],"are":[113,120],"all":[114],"discussed,":[115],"similar":[117],"algorithms":[119,158],"examined":[121],"compared.":[123],"further":[125],"discuss":[126],"avalanche":[128],"effect,":[129],"space,":[131],"frequency":[132],"analysis,":[133],"Shannon":[134],"entropy,":[135],"chosen/known":[137],"plaintext-ciphertext":[138],"attacks,":[139],"how":[141],"remains":[143],"robust":[144],"against":[145],"these":[146],"attacks.":[147],"have":[149],"discussed":[151],"potential":[153],"future":[155],"research":[156],"into":[157],"MEW,":[161],"make":[163],"use":[164],"alternative":[166],"structures":[167],"graphic":[169],"methods":[170],"improving":[172],"models.":[174]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2023-08-17T00:00:00"}
