{"id":"https://openalex.org/W4414259746","doi":"https://doi.org/10.3390/cryptography9030058","title":"From Chaos to Security: A Comparative Study of Lorenz and R\u00f6ssler Systems in Cryptography","display_name":"From Chaos to Security: A Comparative Study of Lorenz and R\u00f6ssler Systems in Cryptography","publication_year":2025,"publication_date":"2025-09-12","ids":{"openalex":"https://openalex.org/W4414259746","doi":"https://doi.org/10.3390/cryptography9030058"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9030058","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9030058","pdf_url":"https://www.mdpi.com/2410-387X/9/3/58/pdf?version=1757672147","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/3/58/pdf?version=1757672147","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108530190","display_name":"Alexandru Dinu","orcid":null},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Alexandru Dinu","raw_affiliation_strings":["Faculty of Electronics, Telecommunications and Information Technology, National University of Science and Tehnology Politehnica Bucharest, 061071 Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Faculty of Electronics, Telecommunications and Information Technology, National University of Science and Tehnology Politehnica Bucharest, 061071 Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5108530190"],"corresponding_institution_ids":["https://openalex.org/I61641377"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":4.284,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.94897273,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"9","issue":"3","first_page":"58","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.6129999756813049},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5083000063896179},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.4611000120639801},{"id":"https://openalex.org/keywords/independence","display_name":"Independence (probability theory)","score":0.4521999955177307},{"id":"https://openalex.org/keywords/attractor","display_name":"Attractor","score":0.4399999976158142},{"id":"https://openalex.org/keywords/lorenz-system","display_name":"Lorenz system","score":0.4146000146865845},{"id":"https://openalex.org/keywords/intersection","display_name":"Intersection (aeronautics)","score":0.4133000075817108},{"id":"https://openalex.org/keywords/synchronization-of-chaos","display_name":"Synchronization of chaos","score":0.41100001335144043},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.40700000524520874}],"concepts":[{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.6129999756813049},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5509999990463257},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5083000063896179},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.4611000120639801},{"id":"https://openalex.org/C35651441","wikidata":"https://www.wikidata.org/wiki/Q625303","display_name":"Independence (probability theory)","level":2,"score":0.4521999955177307},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4440999925136566},{"id":"https://openalex.org/C164380108","wikidata":"https://www.wikidata.org/wiki/Q507187","display_name":"Attractor","level":2,"score":0.4399999976158142},{"id":"https://openalex.org/C151510863","wikidata":"https://www.wikidata.org/wiki/Q899844","display_name":"Lorenz system","level":3,"score":0.4146000146865845},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.4133000075817108},{"id":"https://openalex.org/C202759130","wikidata":"https://www.wikidata.org/wiki/Q7662148","display_name":"Synchronization of chaos","level":4,"score":0.41100001335144043},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.40700000524520874},{"id":"https://openalex.org/C87007009","wikidata":"https://www.wikidata.org/wiki/Q210832","display_name":"Statistical hypothesis testing","level":2,"score":0.4000000059604645},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.3919999897480011},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.38600000739097595},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.38589999079704285},{"id":"https://openalex.org/C191544260","wikidata":"https://www.wikidata.org/wiki/Q1238630","display_name":"Lyapunov exponent","level":3,"score":0.3849000036716461},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.37389999628067017},{"id":"https://openalex.org/C60640748","wikidata":"https://www.wikidata.org/wiki/Q2337858","display_name":"Lyapunov function","level":3,"score":0.36500000953674316},{"id":"https://openalex.org/C118979974","wikidata":"https://www.wikidata.org/wiki/Q187536","display_name":"Butterfly effect","level":3,"score":0.35040000081062317},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3082999885082245},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2915000021457672},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.2915000021457672},{"id":"https://openalex.org/C105125183","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Statistical signal processing","level":4,"score":0.2913999855518341},{"id":"https://openalex.org/C79379906","wikidata":"https://www.wikidata.org/wiki/Q3174497","display_name":"Dynamical systems theory","level":2,"score":0.2750000059604645},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C192872217","wikidata":"https://www.wikidata.org/wiki/Q720574","display_name":"R\u00f6ssler attractor","level":3,"score":0.26499998569488525},{"id":"https://openalex.org/C92866567","wikidata":"https://www.wikidata.org/wiki/Q166314","display_name":"Chaos theory","level":3,"score":0.258899986743927}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography9030058","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9030058","pdf_url":"https://www.mdpi.com/2410-387X/9/3/58/pdf?version=1757672147","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c5460e6d722a4a888ae6dfed840ddb2a","is_oa":true,"landing_page_url":"https://doaj.org/article/c5460e6d722a4a888ae6dfed840ddb2a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 3, p 58 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9030058","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9030058","pdf_url":"https://www.mdpi.com/2410-387X/9/3/58/pdf?version=1757672147","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414259746.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W47623309","https://openalex.org/W601637684","https://openalex.org/W1514425533","https://openalex.org/W1970442252","https://openalex.org/W1997397052","https://openalex.org/W2041779618","https://openalex.org/W2042231188","https://openalex.org/W2053111047","https://openalex.org/W2053454740","https://openalex.org/W2060791695","https://openalex.org/W2076134596","https://openalex.org/W2086515950","https://openalex.org/W2102688401","https://openalex.org/W2105145864","https://openalex.org/W2153472364","https://openalex.org/W2483615080","https://openalex.org/W2792851753","https://openalex.org/W2969916032","https://openalex.org/W3158115921","https://openalex.org/W3188117811","https://openalex.org/W4303627750","https://openalex.org/W4308518373","https://openalex.org/W4313894596","https://openalex.org/W4379518973","https://openalex.org/W4388513850","https://openalex.org/W4406675862","https://openalex.org/W4408613161","https://openalex.org/W4408873228","https://openalex.org/W4411628937","https://openalex.org/W4413175696"],"related_works":[],"abstract_inverted_index":{"Chaotic":[0],"systems,":[1,39],"governed":[2],"by":[3],"deterministic":[4],"nonlinear":[5,59],"equations":[6],"yet":[7],"exhibiting":[8],"highly":[9],"complex":[10],"and":[11,25,37,45,68,73,103,130,142,149],"unpredictable":[12],"behaviors,":[13],"have":[14],"emerged":[15],"as":[16],"valuable":[17],"tools":[18],"at":[19],"the":[20,35,85,95,119],"intersection":[21],"of":[22,34,88],"mathematics,":[23],"engineering,":[24],"information":[26],"security.":[27],"This":[28],"paper":[29],"presents":[30],"a":[31,80,137],"comparative":[32],"study":[33],"Lorenz":[36,96],"R\u00f6ssler":[38,120],"focusing":[40],"on":[41],"their":[42],"dynamic":[43],"complexity":[44],"statistical":[46,69,105],"independence\u2014two":[47],"critical":[48],"properties":[49],"for":[50,113,140],"applications":[51],"in":[52,146],"chaos-based":[53],"cryptography.":[54],"By":[55],"integrating":[56],"techniques":[57],"from":[58],"dynamics":[60],"(e.g.,":[61,71],"Lyapunov":[62],"exponents,":[63],"KS":[64],"entropy,":[65],"Kaplan\u2013Yorke":[66],"dimension)":[67],"testing":[70],"chi-square":[72],"Gaussian":[74],"transformation-based":[75],"independence":[76,106],"tests),":[77],"we":[78],"provide":[79],"quantitative":[81],"framework":[82],"to":[83,101,126,136],"evaluate":[84],"pseudo-randomness":[86],"potential":[87],"chaotic":[89,144],"trajectories.":[90],"Our":[91],"results":[92],"show":[93],"that":[94],"system":[97,121],"offers":[98],"faster":[99],"convergence":[100],"chaos":[102],"superior":[104],"over":[107],"time,":[108],"making":[109],"it":[110],"more":[111],"suitable":[112],"rapid":[114],"encryption":[115],"schemes.":[116],"In":[117],"contrast,":[118],"provides":[122],"complementary":[123],"insights":[124],"due":[125],"its":[127],"simpler":[128],"attractor":[129],"longer":[131],"memory.":[132],"These":[133],"findings":[134],"contribute":[135],"multidisciplinary":[138],"methodology":[139],"selecting":[141],"optimizing":[143],"systems":[145],"secure":[147],"communication":[148],"signal":[150],"processing":[151],"contexts.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
