{"id":"https://openalex.org/W4408370424","doi":"https://doi.org/10.3390/cryptography9010018","title":"Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework","display_name":"Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework","publication_year":2025,"publication_date":"2025-03-12","ids":{"openalex":"https://openalex.org/W4408370424","doi":"https://doi.org/10.3390/cryptography9010018"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9010018","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010018","pdf_url":"https://www.mdpi.com/2410-387X/9/1/18/pdf?version=1741765986","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/1/18/pdf?version=1741765986","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100319962","display_name":"Xinyue Zhang","orcid":"https://orcid.org/0000-0002-4243-083X"},"institutions":[{"id":"https://openalex.org/I4210165845","display_name":"Southwestern Institute of Physics","ror":"https://ror.org/05vrdx898","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210165845"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyue Zhang","raw_affiliation_strings":["National Key Laboratory of Security Communication, Institute of Southwestern Communication, Chengdu 610041, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Security Communication, Institute of Southwestern Communication, Chengdu 610041, China","institution_ids":["https://openalex.org/I4210165845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065924708","display_name":"Daoguang Mu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165845","display_name":"Southwestern Institute of Physics","ror":"https://ror.org/05vrdx898","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210165845"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Daoguang Mu","raw_affiliation_strings":["National Key Laboratory of Security Communication, Institute of Southwestern Communication, Chengdu 610041, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Security Communication, Institute of Southwestern Communication, Chengdu 610041, China","institution_ids":["https://openalex.org/I4210165845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100611739","display_name":"Wenzheng Zhang","orcid":"https://orcid.org/0000-0002-6238-0729"},"institutions":[{"id":"https://openalex.org/I4210165845","display_name":"Southwestern Institute of Physics","ror":"https://ror.org/05vrdx898","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210165845"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenzheng Zhang","raw_affiliation_strings":["National Key Laboratory of Security Communication, Institute of Southwestern Communication, Chengdu 610041, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Security Communication, Institute of Southwestern Communication, Chengdu 610041, China","institution_ids":["https://openalex.org/I4210165845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100862227","display_name":"Xinfeng Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165845","display_name":"Southwestern Institute of Physics","ror":"https://ror.org/05vrdx898","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210165845"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinfeng Dong","raw_affiliation_strings":["National Key Laboratory of Security Communication, Institute of Southwestern Communication, Chengdu 610041, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Security Communication, Institute of Southwestern Communication, Chengdu 610041, China","institution_ids":["https://openalex.org/I4210165845"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100611739"],"corresponding_institution_ids":["https://openalex.org/I4210165845"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0182358,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":"18","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6965658068656921},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.623191237449646},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4895242154598236},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29131507873535156}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6965658068656921},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.623191237449646},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4895242154598236},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29131507873535156}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography9010018","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010018","pdf_url":"https://www.mdpi.com/2410-387X/9/1/18/pdf?version=1741765986","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3dac61b91d114f85a842bff5405aaa39","is_oa":true,"landing_page_url":"https://doaj.org/article/3dac61b91d114f85a842bff5405aaa39","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 1, p 18 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9010018","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9010018","pdf_url":"https://www.mdpi.com/2410-387X/9/1/18/pdf?version=1741765986","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3393451714","display_name":null,"funder_award_id":"61370203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4408370424.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W153516704","https://openalex.org/W1570741313","https://openalex.org/W1590392383","https://openalex.org/W1996182770","https://openalex.org/W2125529777","https://openalex.org/W2130943734","https://openalex.org/W2144385516","https://openalex.org/W2151954684","https://openalex.org/W2405926562","https://openalex.org/W2470954057","https://openalex.org/W2582149751","https://openalex.org/W2753193571","https://openalex.org/W2803382354","https://openalex.org/W2975158636","https://openalex.org/W3126334997","https://openalex.org/W3216283216","https://openalex.org/W4210888065","https://openalex.org/W4234605928","https://openalex.org/W4253757740","https://openalex.org/W4288853143","https://openalex.org/W4288955134","https://openalex.org/W4301810574","https://openalex.org/W4390959583","https://openalex.org/W4404072477","https://openalex.org/W6682104076","https://openalex.org/W6713625740","https://openalex.org/W6744316328","https://openalex.org/W6860869571","https://openalex.org/W6873761259","https://openalex.org/W7034060226"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109"],"abstract_inverted_index":{"Authenticated":[0],"encryption":[1,72,105,147],"with":[2,73,110],"associated":[3],"data":[4],"(AEAD)":[5],"schemes":[6],"based":[7,64],"on":[8,65,90],"stream":[9],"ciphers,":[10],"such":[11],"as":[12],"ASCON":[13],"and":[14,23,40,83,166],"MORUS,":[15],"typically":[16],"use":[17],"nonlinear":[18],"feedback":[19,25],"shift":[20,26],"registers":[21,27],"(NFSRs)":[22],"linear":[24],"(LFSRs)":[28],"to":[29,75,79,108],"generate":[30],"variable-length":[31],"key":[32],"streams.":[33],"While":[34],"these":[35],"methods":[36],"ensure":[37],"message":[38],"confidentiality":[39],"authenticity,":[41],"they":[42],"present":[43,58],"challenges":[44],"in":[45,103],"security":[46,82,113,120,152,157],"analysis,":[47],"especially":[48],"when":[49],"automated":[50,163],"evaluation":[51,87],"is":[52],"involved.":[53],"In":[54],"this":[55],"paper,":[56],"we":[57],"MLOL,":[59],"a":[60,168],"novel":[61],"AEAD":[62,173],"algorithm":[63,174],"the":[66,76,133,141,145],"LOL":[67,137],"framework.":[68],"MLOL":[69,99,117,129],"combines":[70],"authenticated":[71,104,146],"optimizations":[74],"LFSR":[77],"structure":[78],"enhance":[80],"both":[81],"efficiency.":[84],"The":[85],"cost":[86],"demonstrates":[88],"that":[89,116,128],"specialized":[91],"CPU":[92],"platforms":[93],"without":[94],"SIMD":[95],"instruction":[96],"set":[97],"support,":[98],"achieves":[100],"better":[101],"performance":[102,135],"speed":[106],"compared":[107],"LOL-MINI":[109],"GHASH.":[111],"Our":[112],"analysis":[114,164],"confirms":[115],"provides":[118],"256-bit":[119],"against":[121],"current":[122],"cryptanalytic":[123],"techniques.":[124],"Experimental":[125],"results":[126],"demonstrate":[127],"not":[130],"only":[131],"inherits":[132],"excellent":[134],"of":[136,144],"but":[138],"also":[139],"reduces":[140],"time":[142],"complexity":[143],"process,":[148],"providing":[149],"more":[150],"reliable":[151],"guarantees.":[153],"It":[154],"significantly":[155],"simplifies":[156],"evaluation,":[158],"making":[159],"it":[160],"suitable":[161],"for":[162,172],"tools,":[165],"offers":[167],"feasible":[169],"new":[170],"approach":[171],"design.":[175]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
