A compact hardware STBCS design by using stochastic computation Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1186/s42400-025-00385-2
Chaotic systems play an indispensable role in the fields of cryptography and information security. Sine-Transform-Based Chaotic System (STBCS) can address the shortcomings of low complexity and limited chaotic behaviour of classical chaos systems. In this paper, a compact hardware STBCS is proposed and developed on the FPGA device by using the Stochastic Computation (SC) technique. The traditional arithmetic operations are replaced by the SC and finite state machines design. The structure of STBCS is optimised, where the disturbance method is employed to improve the chaotic behaviours and also taking the SC method into account for implementation. The hardware performance of the proposed design is verified via various tests of the chaotic system and corresponding random number generator. Experimental results show that the utilisation of the hardware resources is reduced especially the DSP components compared to the traditional design methods. This provides an efficient design for the random generator of the alternative cryptosystems.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1186/s42400-025-00385-2
- https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00385-2
- OA Status
- diamond
- References
- 34
- OpenAlex ID
- https://openalex.org/W4415899221
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4415899221Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1186/s42400-025-00385-2Digital Object Identifier
- Title
-
A compact hardware STBCS design by using stochastic computationWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-11-05Full publication date if available
- Authors
-
Junxiu Liu, Zhewei Liang, Yuling Luo, Qiang Fu, Shengfeng Qin, Junjie LiuList of authors in order
- Landing page
-
https://doi.org/10.1186/s42400-025-00385-2Publisher landing page
- PDF URL
-
https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00385-2Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00385-2Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
34Number of works referenced by this work
Full payload
| id | https://openalex.org/W4415899221 |
|---|---|
| doi | https://doi.org/10.1186/s42400-025-00385-2 |
| ids.doi | https://doi.org/10.1186/s42400-025-00385-2 |
| ids.openalex | https://openalex.org/W4415899221 |
| fwci | |
| type | article |
| title | A compact hardware STBCS design by using stochastic computation |
| biblio.issue | 1 |
| biblio.volume | 8 |
| biblio.last_page | |
| biblio.first_page | |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| language | en |
| locations[0].id | doi:10.1186/s42400-025-00385-2 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S3035238565 |
| locations[0].source.issn | 2523-3246 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2523-3246 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Cybersecurity |
| locations[0].source.host_organization | https://openalex.org/P4310319965 |
| locations[0].source.host_organization_name | Springer Nature |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Nature |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00385-2 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Cybersecurity |
| locations[0].landing_page_url | https://doi.org/10.1186/s42400-025-00385-2 |
| locations[1].id | pmh:oai:doaj.org/article:d854bfe8be804b06b5cb8b5374131672 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Cybersecurity, Vol 8, Iss 1, Pp 1-12 (2025) |
| locations[1].landing_page_url | https://doaj.org/article/d854bfe8be804b06b5cb8b5374131672 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5044091027 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-9790-1571 |
| authorships[0].author.display_name | Junxiu Liu |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I29739308 |
| authorships[0].affiliations[0].raw_affiliation_string | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[0].institutions[0].id | https://openalex.org/I29739308 |
| authorships[0].institutions[0].ror | https://ror.org/02frt9q65 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I29739308 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Guangxi Normal University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Junxiu Liu |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[1].author.id | https://openalex.org/A5038697819 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-4224-0497 |
| authorships[1].author.display_name | Zhewei Liang |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I29739308 |
| authorships[1].affiliations[0].raw_affiliation_string | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[1].institutions[0].id | https://openalex.org/I29739308 |
| authorships[1].institutions[0].ror | https://ror.org/02frt9q65 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I29739308 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Guangxi Normal University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Zhewei Liang |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[2].author.id | https://openalex.org/A5112127033 |
| authorships[2].author.orcid | https://orcid.org/0009-0000-3299-4853 |
| authorships[2].author.display_name | Yuling Luo |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I29739308 |
| authorships[2].affiliations[0].raw_affiliation_string | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[2].institutions[0].id | https://openalex.org/I29739308 |
| authorships[2].institutions[0].ror | https://ror.org/02frt9q65 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I29739308 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Guangxi Normal University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Yuling Luo |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[3].author.id | https://openalex.org/A5101992907 |
| authorships[3].author.orcid | https://orcid.org/0009-0004-7159-6515 |
| authorships[3].author.display_name | Qiang Fu |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I29739308 |
| authorships[3].affiliations[0].raw_affiliation_string | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[3].institutions[0].id | https://openalex.org/I29739308 |
| authorships[3].institutions[0].ror | https://ror.org/02frt9q65 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I29739308 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Guangxi Normal University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Qiang Fu |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[4].author.id | https://openalex.org/A5089336832 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-8538-8136 |
| authorships[4].author.display_name | Shengfeng Qin |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I29739308 |
| authorships[4].affiliations[0].raw_affiliation_string | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[4].institutions[0].id | https://openalex.org/I29739308 |
| authorships[4].institutions[0].ror | https://ror.org/02frt9q65 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I29739308 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | Guangxi Normal University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Sheng Qin |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[5].author.id | https://openalex.org/A5100396426 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-3636-4549 |
| authorships[5].author.display_name | Junjie Liu |
| authorships[5].countries | CN |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I29739308 |
| authorships[5].affiliations[0].raw_affiliation_string | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| authorships[5].institutions[0].id | https://openalex.org/I29739308 |
| authorships[5].institutions[0].ror | https://ror.org/02frt9q65 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I29739308 |
| authorships[5].institutions[0].country_code | CN |
| authorships[5].institutions[0].display_name | Guangxi Normal University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Junjie Liu |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, Guilin, 541004, China |
| has_content.pdf | True |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00385-2 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-11-05T00:00:00 |
| display_name | A compact hardware STBCS design by using stochastic computation |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T04:12:42.849631 |
| primary_topic | |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1186/s42400-025-00385-2 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S3035238565 |
| best_oa_location.source.issn | 2523-3246 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2523-3246 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Cybersecurity |
| best_oa_location.source.host_organization | https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_name | Springer Nature |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Nature |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00385-2 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Cybersecurity |
| best_oa_location.landing_page_url | https://doi.org/10.1186/s42400-025-00385-2 |
| primary_location.id | doi:10.1186/s42400-025-00385-2 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S3035238565 |
| primary_location.source.issn | 2523-3246 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2523-3246 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Cybersecurity |
| primary_location.source.host_organization | https://openalex.org/P4310319965 |
| primary_location.source.host_organization_name | Springer Nature |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Nature |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00385-2 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Cybersecurity |
| primary_location.landing_page_url | https://doi.org/10.1186/s42400-025-00385-2 |
| publication_date | 2025-11-05 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W3197325753, https://openalex.org/W3186301964, https://openalex.org/W4394598255, https://openalex.org/W4281649286, https://openalex.org/W1516007218, https://openalex.org/W2147895046, https://openalex.org/W2043523826, https://openalex.org/W2113619583, https://openalex.org/W2047830439, https://openalex.org/W2905741893, https://openalex.org/W2743732015, https://openalex.org/W2783110569, https://openalex.org/W2051703460, https://openalex.org/W3154800872, https://openalex.org/W4389347592, https://openalex.org/W4210706407, https://openalex.org/W2119871004, https://openalex.org/W2027269053, https://openalex.org/W2095463005, https://openalex.org/W4206999926, https://openalex.org/W2990777726, https://openalex.org/W2497469380, https://openalex.org/W4226180019, https://openalex.org/W2171060285, https://openalex.org/W3153149994, https://openalex.org/W2914283612, https://openalex.org/W2604894355, https://openalex.org/W2088639203, https://openalex.org/W2072741528, https://openalex.org/W2280707411, https://openalex.org/W2144076325, https://openalex.org/W4390517532, https://openalex.org/W4396561988, https://openalex.org/W4400247927 |
| referenced_works_count | 34 |
| abstract_inverted_index.a | 37 |
| abstract_inverted_index.In | 34 |
| abstract_inverted_index.SC | 64, 91 |
| abstract_inverted_index.an | 4, 142 |
| abstract_inverted_index.by | 49, 62 |
| abstract_inverted_index.in | 7 |
| abstract_inverted_index.is | 41, 74, 80, 104, 128 |
| abstract_inverted_index.of | 10, 23, 30, 72, 100, 109, 124, 149 |
| abstract_inverted_index.on | 45 |
| abstract_inverted_index.to | 82, 135 |
| abstract_inverted_index.DSP | 132 |
| abstract_inverted_index.The | 56, 70, 97 |
| abstract_inverted_index.and | 12, 26, 43, 65, 87, 113 |
| abstract_inverted_index.are | 60 |
| abstract_inverted_index.can | 19 |
| abstract_inverted_index.for | 95, 145 |
| abstract_inverted_index.low | 24 |
| abstract_inverted_index.the | 8, 21, 46, 51, 63, 77, 84, 90, 101, 110, 122, 125, 131, 136, 146, 150 |
| abstract_inverted_index.via | 106 |
| abstract_inverted_index.(SC) | 54 |
| abstract_inverted_index.FPGA | 47 |
| abstract_inverted_index.This | 140 |
| abstract_inverted_index.also | 88 |
| abstract_inverted_index.into | 93 |
| abstract_inverted_index.play | 3 |
| abstract_inverted_index.role | 6 |
| abstract_inverted_index.show | 120 |
| abstract_inverted_index.that | 121 |
| abstract_inverted_index.this | 35 |
| abstract_inverted_index.STBCS | 40, 73 |
| abstract_inverted_index.chaos | 32 |
| abstract_inverted_index.state | 67 |
| abstract_inverted_index.tests | 108 |
| abstract_inverted_index.using | 50 |
| abstract_inverted_index.where | 76 |
| abstract_inverted_index.System | 17 |
| abstract_inverted_index.design | 103, 138, 144 |
| abstract_inverted_index.device | 48 |
| abstract_inverted_index.fields | 9 |
| abstract_inverted_index.finite | 66 |
| abstract_inverted_index.method | 79, 92 |
| abstract_inverted_index.number | 116 |
| abstract_inverted_index.paper, | 36 |
| abstract_inverted_index.random | 115, 147 |
| abstract_inverted_index.system | 112 |
| abstract_inverted_index.taking | 89 |
| abstract_inverted_index.(STBCS) | 18 |
| abstract_inverted_index.Chaotic | 1, 16 |
| abstract_inverted_index.account | 94 |
| abstract_inverted_index.address | 20 |
| abstract_inverted_index.chaotic | 28, 85, 111 |
| abstract_inverted_index.compact | 38 |
| abstract_inverted_index.design. | 69 |
| abstract_inverted_index.improve | 83 |
| abstract_inverted_index.limited | 27 |
| abstract_inverted_index.reduced | 129 |
| abstract_inverted_index.results | 119 |
| abstract_inverted_index.systems | 2 |
| abstract_inverted_index.various | 107 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.compared | 134 |
| abstract_inverted_index.employed | 81 |
| abstract_inverted_index.hardware | 39, 98, 126 |
| abstract_inverted_index.machines | 68 |
| abstract_inverted_index.methods. | 139 |
| abstract_inverted_index.proposed | 42, 102 |
| abstract_inverted_index.provides | 141 |
| abstract_inverted_index.replaced | 61 |
| abstract_inverted_index.systems. | 33 |
| abstract_inverted_index.verified | 105 |
| abstract_inverted_index.behaviour | 29 |
| abstract_inverted_index.classical | 31 |
| abstract_inverted_index.developed | 44 |
| abstract_inverted_index.efficient | 143 |
| abstract_inverted_index.generator | 148 |
| abstract_inverted_index.resources | 127 |
| abstract_inverted_index.security. | 14 |
| abstract_inverted_index.structure | 71 |
| abstract_inverted_index.Stochastic | 52 |
| abstract_inverted_index.arithmetic | 58 |
| abstract_inverted_index.behaviours | 86 |
| abstract_inverted_index.complexity | 25 |
| abstract_inverted_index.components | 133 |
| abstract_inverted_index.especially | 130 |
| abstract_inverted_index.generator. | 117 |
| abstract_inverted_index.operations | 59 |
| abstract_inverted_index.optimised, | 75 |
| abstract_inverted_index.technique. | 55 |
| abstract_inverted_index.Computation | 53 |
| abstract_inverted_index.alternative | 151 |
| abstract_inverted_index.disturbance | 78 |
| abstract_inverted_index.information | 13 |
| abstract_inverted_index.performance | 99 |
| abstract_inverted_index.traditional | 57, 137 |
| abstract_inverted_index.utilisation | 123 |
| abstract_inverted_index.Experimental | 118 |
| abstract_inverted_index.cryptography | 11 |
| abstract_inverted_index.shortcomings | 22 |
| abstract_inverted_index.corresponding | 114 |
| abstract_inverted_index.indispensable | 5 |
| abstract_inverted_index.cryptosystems. | 152 |
| abstract_inverted_index.implementation. | 96 |
| abstract_inverted_index.Sine-Transform-Based | 15 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile |