Compcrypt–Lightweight ANS-Based Compression and Encryption Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1109/tifs.2021.3096026
Compression is widely used in Internet applications to save communication time, bandwidth and storage. Recently invented by Jarek Duda asymmetric numeral system (ANS) offers an improved efficiency and a close to optimal compression. The ANS algorithm has been deployed by major IT companies such as Facebook, Google and Apple. Compression by itself does not provide any security (such as confidentiality or authentication of transmitted data). An obvious solution to this problem is an encryption of compressed bitstream. However, it requires two algorithms: one for compression and the other for encryption. In this work, we investigate natural properties of ANS that allow to incorporate authenticated encryption using as little cryptography as possible. We target low-level security communication and storage such as transmission of data from IoT devices/sensors. In particular, we propose three solutions for joint compression and encryption (compcrypt). The solutions offer different tradeoffs between security and efficiency assuming a slight compression deterioration. All of them use a pseudorandom bit generator (PRBG) based on lightweight stream ciphers. The first solution is close to original ANS and applies state jumps controlled by PRBG. The second one employs two copies of ANS, where compression is switched between the copies. The switch is controlled by a PRBG bit. The third compcrypt modifies the encoding function of ANS depending on PRBG bits. Security and efficiency of the proposed compcrypt algorithms are evaluated. The first compcrypt is the most efficient with a slight loss of compression quality. The second one consumes more storage but the loss of compression quality is negligible. The last compcrypt offers the best security but is the least efficient.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- https://doi.org/10.1109/tifs.2021.3096026
- https://ieeexplore.ieee.org/ielx7/10206/9151439/09478894.pdf
- OA Status
- hybrid
- Cited By
- 1
- References
- 21
- Related Works
- 20
- OpenAlex ID
- https://openalex.org/W3128075454
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3128075454Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/tifs.2021.3096026Digital Object Identifier
- Title
-
Compcrypt–Lightweight ANS-Based Compression and EncryptionWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-01-01Full publication date if available
- Authors
-
Seyit Camtepe, Jarek Duda, Arash Mahboubi, Paweł Morawiecki, Surya Nepal, Marcin Pawłowski, Josef PieprzykList of authors in order
- Landing page
-
https://doi.org/10.1109/tifs.2021.3096026Publisher landing page
- PDF URL
-
https://ieeexplore.ieee.org/ielx7/10206/9151439/09478894.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://ieeexplore.ieee.org/ielx7/10206/9151439/09478894.pdfDirect OA link when available
- Concepts
-
Computer science, Encryption, Bitstream, Data compression, Cryptography, 40-bit encryption, Computer network, Compression (physics), Computer hardware, Lossless compression, Hash function, Computer engineering, Real-time computing, Algorithm, Computer security, Decoding methods, Composite material, Materials scienceTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2022: 1Per-year citation counts (last 5 years)
- References (count)
-
21Number of works referenced by this work
- Related works (count)
-
20Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3128075454 |
|---|---|
| doi | https://doi.org/10.1109/tifs.2021.3096026 |
| ids.doi | https://doi.org/10.1109/tifs.2021.3096026 |
| ids.mag | 3128075454 |
| ids.openalex | https://openalex.org/W3128075454 |
| fwci | 0.10221948 |
| type | preprint |
| title | Compcrypt–Lightweight ANS-Based Compression and Encryption |
| biblio.issue | |
| biblio.volume | 16 |
| biblio.last_page | 3873 |
| biblio.first_page | 3859 |
| topics[0].id | https://openalex.org/T11017 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9980000257492065 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Chaos-based Image/Signal Encryption |
| topics[1].id | https://openalex.org/T10951 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9961000084877014 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Cryptographic Implementations and Security |
| topics[2].id | https://openalex.org/T11130 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9864000082015991 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Coding theory and cryptography |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8386340737342834 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C148730421 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7355974912643433 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[1].display_name | Encryption |
| concepts[2].id | https://openalex.org/C136695289 |
| concepts[2].level | 3 |
| concepts[2].score | 0.533519446849823 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q415568 |
| concepts[2].display_name | Bitstream |
| concepts[3].id | https://openalex.org/C78548338 |
| concepts[3].level | 2 |
| concepts[3].score | 0.484352707862854 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q2493 |
| concepts[3].display_name | Data compression |
| concepts[4].id | https://openalex.org/C178489894 |
| concepts[4].level | 2 |
| concepts[4].score | 0.4748956263065338 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[4].display_name | Cryptography |
| concepts[5].id | https://openalex.org/C158215988 |
| concepts[5].level | 3 |
| concepts[5].score | 0.46219828724861145 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q4637271 |
| concepts[5].display_name | 40-bit encryption |
| concepts[6].id | https://openalex.org/C31258907 |
| concepts[6].level | 1 |
| concepts[6].score | 0.4522455632686615 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[6].display_name | Computer network |
| concepts[7].id | https://openalex.org/C180016635 |
| concepts[7].level | 2 |
| concepts[7].score | 0.43093299865722656 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q2712821 |
| concepts[7].display_name | Compression (physics) |
| concepts[8].id | https://openalex.org/C9390403 |
| concepts[8].level | 1 |
| concepts[8].score | 0.4181668758392334 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3966 |
| concepts[8].display_name | Computer hardware |
| concepts[9].id | https://openalex.org/C81081738 |
| concepts[9].level | 3 |
| concepts[9].score | 0.4179005026817322 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q55542 |
| concepts[9].display_name | Lossless compression |
| concepts[10].id | https://openalex.org/C99138194 |
| concepts[10].level | 2 |
| concepts[10].score | 0.4115256071090698 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q183427 |
| concepts[10].display_name | Hash function |
| concepts[11].id | https://openalex.org/C113775141 |
| concepts[11].level | 1 |
| concepts[11].score | 0.3960670232772827 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q428691 |
| concepts[11].display_name | Computer engineering |
| concepts[12].id | https://openalex.org/C79403827 |
| concepts[12].level | 1 |
| concepts[12].score | 0.39571988582611084 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[12].display_name | Real-time computing |
| concepts[13].id | https://openalex.org/C11413529 |
| concepts[13].level | 1 |
| concepts[13].score | 0.3391610383987427 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[13].display_name | Algorithm |
| concepts[14].id | https://openalex.org/C38652104 |
| concepts[14].level | 1 |
| concepts[14].score | 0.2152310311794281 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[14].display_name | Computer security |
| concepts[15].id | https://openalex.org/C57273362 |
| concepts[15].level | 2 |
| concepts[15].score | 0.20890426635742188 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q576722 |
| concepts[15].display_name | Decoding methods |
| concepts[16].id | https://openalex.org/C159985019 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q181790 |
| concepts[16].display_name | Composite material |
| concepts[17].id | https://openalex.org/C192562407 |
| concepts[17].level | 0 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q228736 |
| concepts[17].display_name | Materials science |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8386340737342834 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/encryption |
| keywords[1].score | 0.7355974912643433 |
| keywords[1].display_name | Encryption |
| keywords[2].id | https://openalex.org/keywords/bitstream |
| keywords[2].score | 0.533519446849823 |
| keywords[2].display_name | Bitstream |
| keywords[3].id | https://openalex.org/keywords/data-compression |
| keywords[3].score | 0.484352707862854 |
| keywords[3].display_name | Data compression |
| keywords[4].id | https://openalex.org/keywords/cryptography |
| keywords[4].score | 0.4748956263065338 |
| keywords[4].display_name | Cryptography |
| keywords[5].id | https://openalex.org/keywords/40-bit-encryption |
| keywords[5].score | 0.46219828724861145 |
| keywords[5].display_name | 40-bit encryption |
| keywords[6].id | https://openalex.org/keywords/computer-network |
| keywords[6].score | 0.4522455632686615 |
| keywords[6].display_name | Computer network |
| keywords[7].id | https://openalex.org/keywords/compression |
| keywords[7].score | 0.43093299865722656 |
| keywords[7].display_name | Compression (physics) |
| keywords[8].id | https://openalex.org/keywords/computer-hardware |
| keywords[8].score | 0.4181668758392334 |
| keywords[8].display_name | Computer hardware |
| keywords[9].id | https://openalex.org/keywords/lossless-compression |
| keywords[9].score | 0.4179005026817322 |
| keywords[9].display_name | Lossless compression |
| keywords[10].id | https://openalex.org/keywords/hash-function |
| keywords[10].score | 0.4115256071090698 |
| keywords[10].display_name | Hash function |
| keywords[11].id | https://openalex.org/keywords/computer-engineering |
| keywords[11].score | 0.3960670232772827 |
| keywords[11].display_name | Computer engineering |
| keywords[12].id | https://openalex.org/keywords/real-time-computing |
| keywords[12].score | 0.39571988582611084 |
| keywords[12].display_name | Real-time computing |
| keywords[13].id | https://openalex.org/keywords/algorithm |
| keywords[13].score | 0.3391610383987427 |
| keywords[13].display_name | Algorithm |
| keywords[14].id | https://openalex.org/keywords/computer-security |
| keywords[14].score | 0.2152310311794281 |
| keywords[14].display_name | Computer security |
| keywords[15].id | https://openalex.org/keywords/decoding-methods |
| keywords[15].score | 0.20890426635742188 |
| keywords[15].display_name | Decoding methods |
| language | en |
| locations[0].id | doi:10.1109/tifs.2021.3096026 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S61310614 |
| locations[0].source.issn | 1556-6013, 1556-6021 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1556-6013 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | IEEE Transactions on Information Forensics and Security |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://ieeexplore.ieee.org/ielx7/10206/9151439/09478894.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Transactions on Information Forensics and Security |
| locations[0].landing_page_url | https://doi.org/10.1109/tifs.2021.3096026 |
| locations[1].id | pmh:oai:ruj.uj.edu.pl:item/282527 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400316 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Homo Politicus (Academy of Humanities and Economics in Lodz) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | artykuł w czasopiśmie |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://ruj.uj.edu.pl/xmlui/handle/item/282527 |
| locations[2].id | mag:3128075454 |
| locations[2].is_oa | False |
| locations[2].source.id | https://openalex.org/S2764847869 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | IACR Cryptology ePrint Archive |
| locations[2].source.host_organization | |
| locations[2].source.host_organization_name | |
| locations[2].source.host_organization_lineage | https://openalex.org/P4322614454 |
| locations[2].source.host_organization_lineage_names | Cryptology ePrint Archive |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | IACR Cryptology ePrint Archive |
| locations[2].landing_page_url | https://eprint.iacr.org/2021/010.pdf |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5084022157 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-6353-8359 |
| authorships[0].author.display_name | Seyit Camtepe |
| authorships[0].countries | AU |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I1292875679, https://openalex.org/I42894916 |
| authorships[0].affiliations[0].raw_affiliation_string | Data61, CSIRO, Sydney, NSW, Australia#TAB# |
| authorships[0].institutions[0].id | https://openalex.org/I1292875679 |
| authorships[0].institutions[0].ror | https://ror.org/03qn8fb07 |
| authorships[0].institutions[0].type | government |
| authorships[0].institutions[0].lineage | https://openalex.org/I1292875679, https://openalex.org/I2801453606, https://openalex.org/I4387156119 |
| authorships[0].institutions[0].country_code | AU |
| authorships[0].institutions[0].display_name | Commonwealth Scientific and Industrial Research Organisation |
| authorships[0].institutions[1].id | https://openalex.org/I42894916 |
| authorships[0].institutions[1].ror | https://ror.org/03q397159 |
| authorships[0].institutions[1].type | other |
| authorships[0].institutions[1].lineage | https://openalex.org/I1292875679, https://openalex.org/I2801453606, https://openalex.org/I42894916, https://openalex.org/I4387156119 |
| authorships[0].institutions[1].country_code | AU |
| authorships[0].institutions[1].display_name | Data61 |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Seyit Camtepe |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Data61, CSIRO, Sydney, NSW, Australia#TAB# |
| authorships[1].author.id | https://openalex.org/A5109420627 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Jarek Duda |
| authorships[1].countries | PL |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I126596746, https://openalex.org/I4210087266 |
| authorships[1].affiliations[0].raw_affiliation_string | [Institute of Computer Science and Computer Mathematics, Jagiellonian University, Krakow, Poland] |
| authorships[1].institutions[0].id | https://openalex.org/I4210087266 |
| authorships[1].institutions[0].ror | https://ror.org/003fvp964 |
| authorships[1].institutions[0].type | facility |
| authorships[1].institutions[0].lineage | https://openalex.org/I4210087266, https://openalex.org/I99542240 |
| authorships[1].institutions[0].country_code | PL |
| authorships[1].institutions[0].display_name | Institute of Computer Science |
| authorships[1].institutions[1].id | https://openalex.org/I126596746 |
| authorships[1].institutions[1].ror | https://ror.org/03bqmcz70 |
| authorships[1].institutions[1].type | education |
| authorships[1].institutions[1].lineage | https://openalex.org/I126596746 |
| authorships[1].institutions[1].country_code | PL |
| authorships[1].institutions[1].display_name | Jagiellonian University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Jarek Duda |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | [Institute of Computer Science and Computer Mathematics, Jagiellonian University, Krakow, Poland] |
| authorships[2].author.id | https://openalex.org/A5021725402 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-0487-0615 |
| authorships[2].author.display_name | Arash Mahboubi |
| authorships[2].countries | AU |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I153230381 |
| authorships[2].affiliations[0].raw_affiliation_string | [School of Computing & Mathematics, Charles Sturt University, Bathurst, NSW, Australia] |
| authorships[2].institutions[0].id | https://openalex.org/I153230381 |
| authorships[2].institutions[0].ror | https://ror.org/00wfvh315 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I153230381 |
| authorships[2].institutions[0].country_code | AU |
| authorships[2].institutions[0].display_name | Charles Sturt University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Arash Mahboubi |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | [School of Computing & Mathematics, Charles Sturt University, Bathurst, NSW, Australia] |
| authorships[3].author.id | https://openalex.org/A5005443087 |
| authorships[3].author.orcid | https://orcid.org/0000-0003-3349-8645 |
| authorships[3].author.display_name | Paweł Morawiecki |
| authorships[3].countries | PL |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4210087266, https://openalex.org/I99542240 |
| authorships[3].affiliations[0].raw_affiliation_string | Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland#TAB# |
| authorships[3].institutions[0].id | https://openalex.org/I4210087266 |
| authorships[3].institutions[0].ror | https://ror.org/003fvp964 |
| authorships[3].institutions[0].type | facility |
| authorships[3].institutions[0].lineage | https://openalex.org/I4210087266, https://openalex.org/I99542240 |
| authorships[3].institutions[0].country_code | PL |
| authorships[3].institutions[0].display_name | Institute of Computer Science |
| authorships[3].institutions[1].id | https://openalex.org/I99542240 |
| authorships[3].institutions[1].ror | https://ror.org/01dr6c206 |
| authorships[3].institutions[1].type | government |
| authorships[3].institutions[1].lineage | https://openalex.org/I99542240 |
| authorships[3].institutions[1].country_code | PL |
| authorships[3].institutions[1].display_name | Polish Academy of Sciences |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Pawel Morawiecki |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland#TAB# |
| authorships[4].author.id | https://openalex.org/A5082256444 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-3289-6599 |
| authorships[4].author.display_name | Surya Nepal |
| authorships[4].countries | AU |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I1292875679, https://openalex.org/I42894916 |
| authorships[4].affiliations[0].raw_affiliation_string | Data61, CSIRO, Sydney, NSW, Australia#TAB# |
| authorships[4].institutions[0].id | https://openalex.org/I1292875679 |
| authorships[4].institutions[0].ror | https://ror.org/03qn8fb07 |
| authorships[4].institutions[0].type | government |
| authorships[4].institutions[0].lineage | https://openalex.org/I1292875679, https://openalex.org/I2801453606, https://openalex.org/I4387156119 |
| authorships[4].institutions[0].country_code | AU |
| authorships[4].institutions[0].display_name | Commonwealth Scientific and Industrial Research Organisation |
| authorships[4].institutions[1].id | https://openalex.org/I42894916 |
| authorships[4].institutions[1].ror | https://ror.org/03q397159 |
| authorships[4].institutions[1].type | other |
| authorships[4].institutions[1].lineage | https://openalex.org/I1292875679, https://openalex.org/I2801453606, https://openalex.org/I42894916, https://openalex.org/I4387156119 |
| authorships[4].institutions[1].country_code | AU |
| authorships[4].institutions[1].display_name | Data61 |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Surya Nepal |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Data61, CSIRO, Sydney, NSW, Australia#TAB# |
| authorships[5].author.id | https://openalex.org/A5075545991 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-5145-9220 |
| authorships[5].author.display_name | Marcin Pawłowski |
| authorships[5].countries | PL |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I4210087266, https://openalex.org/I99542240 |
| authorships[5].affiliations[0].raw_affiliation_string | Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland#TAB# |
| authorships[5].institutions[0].id | https://openalex.org/I4210087266 |
| authorships[5].institutions[0].ror | https://ror.org/003fvp964 |
| authorships[5].institutions[0].type | facility |
| authorships[5].institutions[0].lineage | https://openalex.org/I4210087266, https://openalex.org/I99542240 |
| authorships[5].institutions[0].country_code | PL |
| authorships[5].institutions[0].display_name | Institute of Computer Science |
| authorships[5].institutions[1].id | https://openalex.org/I99542240 |
| authorships[5].institutions[1].ror | https://ror.org/01dr6c206 |
| authorships[5].institutions[1].type | government |
| authorships[5].institutions[1].lineage | https://openalex.org/I99542240 |
| authorships[5].institutions[1].country_code | PL |
| authorships[5].institutions[1].display_name | Polish Academy of Sciences |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Marcin Pawlowski |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland#TAB# |
| authorships[6].author.id | https://openalex.org/A5045977578 |
| authorships[6].author.orcid | https://orcid.org/0000-0002-1917-6466 |
| authorships[6].author.display_name | Josef Pieprzyk |
| authorships[6].countries | AU |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I1292875679, https://openalex.org/I42894916 |
| authorships[6].affiliations[0].raw_affiliation_string | Data61, CSIRO, Sydney, NSW, Australia#TAB# |
| authorships[6].institutions[0].id | https://openalex.org/I1292875679 |
| authorships[6].institutions[0].ror | https://ror.org/03qn8fb07 |
| authorships[6].institutions[0].type | government |
| authorships[6].institutions[0].lineage | https://openalex.org/I1292875679, https://openalex.org/I2801453606, https://openalex.org/I4387156119 |
| authorships[6].institutions[0].country_code | AU |
| authorships[6].institutions[0].display_name | Commonwealth Scientific and Industrial Research Organisation |
| authorships[6].institutions[1].id | https://openalex.org/I42894916 |
| authorships[6].institutions[1].ror | https://ror.org/03q397159 |
| authorships[6].institutions[1].type | other |
| authorships[6].institutions[1].lineage | https://openalex.org/I1292875679, https://openalex.org/I2801453606, https://openalex.org/I42894916, https://openalex.org/I4387156119 |
| authorships[6].institutions[1].country_code | AU |
| authorships[6].institutions[1].display_name | Data61 |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | Josef Pieprzyk |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Data61, CSIRO, Sydney, NSW, Australia#TAB# |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ieeexplore.ieee.org/ielx7/10206/9151439/09478894.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Compcrypt–Lightweight ANS-Based Compression and Encryption |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11017 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9980000257492065 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Chaos-based Image/Signal Encryption |
| related_works | https://openalex.org/W2533618820, https://openalex.org/W2007802160, https://openalex.org/W2903992185, https://openalex.org/W2302552281, https://openalex.org/W2267477823, https://openalex.org/W2232262673, https://openalex.org/W2587304320, https://openalex.org/W71663388, https://openalex.org/W2118347323, https://openalex.org/W2346571358, https://openalex.org/W2739837904, https://openalex.org/W3094947110, https://openalex.org/W3135602980, https://openalex.org/W3127365414, https://openalex.org/W2764316172, https://openalex.org/W2949442336, https://openalex.org/W2346394923, https://openalex.org/W2188482409, https://openalex.org/W2896948810, https://openalex.org/W2206972531 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2022 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 3 |
| best_oa_location.id | doi:10.1109/tifs.2021.3096026 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S61310614 |
| best_oa_location.source.issn | 1556-6013, 1556-6021 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1556-6013 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | IEEE Transactions on Information Forensics and Security |
| best_oa_location.source.host_organization | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://ieeexplore.ieee.org/ielx7/10206/9151439/09478894.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | IEEE Transactions on Information Forensics and Security |
| best_oa_location.landing_page_url | https://doi.org/10.1109/tifs.2021.3096026 |
| primary_location.id | doi:10.1109/tifs.2021.3096026 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S61310614 |
| primary_location.source.issn | 1556-6013, 1556-6021 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1556-6013 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | IEEE Transactions on Information Forensics and Security |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://ieeexplore.ieee.org/ielx7/10206/9151439/09478894.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Transactions on Information Forensics and Security |
| primary_location.landing_page_url | https://doi.org/10.1109/tifs.2021.3096026 |
| publication_date | 2021-01-01 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W6763703350, https://openalex.org/W2143927731, https://openalex.org/W2894098332, https://openalex.org/W2129768577, https://openalex.org/W4252420661, https://openalex.org/W2072210981, https://openalex.org/W3041245763, https://openalex.org/W1561363170, https://openalex.org/W2773336602, https://openalex.org/W1577505202, https://openalex.org/W6689148449, https://openalex.org/W2142090582, https://openalex.org/W6733233678, https://openalex.org/W2085759780, https://openalex.org/W2108104892, https://openalex.org/W2060108852, https://openalex.org/W2624976996, https://openalex.org/W1995875735, https://openalex.org/W2046419776, https://openalex.org/W3150645827, https://openalex.org/W2046853506 |
| referenced_works_count | 21 |
| abstract_inverted_index.a | 28, 148, 156, 201, 235 |
| abstract_inverted_index.An | 65 |
| abstract_inverted_index.IT | 41 |
| abstract_inverted_index.In | 90, 126 |
| abstract_inverted_index.We | 111 |
| abstract_inverted_index.an | 24, 72 |
| abstract_inverted_index.as | 44, 58, 106, 109, 119 |
| abstract_inverted_index.by | 16, 39, 50, 179, 200 |
| abstract_inverted_index.in | 4 |
| abstract_inverted_index.is | 1, 71, 169, 191, 198, 230, 253, 263 |
| abstract_inverted_index.it | 78 |
| abstract_inverted_index.of | 62, 74, 97, 121, 153, 187, 211, 220, 238, 250 |
| abstract_inverted_index.on | 162, 214 |
| abstract_inverted_index.or | 60 |
| abstract_inverted_index.to | 7, 30, 68, 101, 171 |
| abstract_inverted_index.we | 93, 128 |
| abstract_inverted_index.ANS | 34, 98, 173, 212 |
| abstract_inverted_index.All | 152 |
| abstract_inverted_index.IoT | 124 |
| abstract_inverted_index.The | 33, 138, 166, 181, 196, 204, 227, 241, 255 |
| abstract_inverted_index.and | 12, 27, 47, 85, 116, 135, 145, 174, 218 |
| abstract_inverted_index.any | 55 |
| abstract_inverted_index.are | 225 |
| abstract_inverted_index.bit | 158 |
| abstract_inverted_index.but | 247, 262 |
| abstract_inverted_index.for | 83, 88, 132 |
| abstract_inverted_index.has | 36 |
| abstract_inverted_index.not | 53 |
| abstract_inverted_index.one | 82, 183, 243 |
| abstract_inverted_index.the | 86, 194, 208, 221, 231, 248, 259, 264 |
| abstract_inverted_index.two | 80, 185 |
| abstract_inverted_index.use | 155 |
| abstract_inverted_index.ANS, | 188 |
| abstract_inverted_index.Duda | 18 |
| abstract_inverted_index.PRBG | 202, 215 |
| abstract_inverted_index.been | 37 |
| abstract_inverted_index.best | 260 |
| abstract_inverted_index.bit. | 203 |
| abstract_inverted_index.data | 122 |
| abstract_inverted_index.does | 52 |
| abstract_inverted_index.from | 123 |
| abstract_inverted_index.last | 256 |
| abstract_inverted_index.loss | 237, 249 |
| abstract_inverted_index.more | 245 |
| abstract_inverted_index.most | 232 |
| abstract_inverted_index.save | 8 |
| abstract_inverted_index.such | 43, 118 |
| abstract_inverted_index.that | 99 |
| abstract_inverted_index.them | 154 |
| abstract_inverted_index.this | 69, 91 |
| abstract_inverted_index.used | 3 |
| abstract_inverted_index.with | 234 |
| abstract_inverted_index.(ANS) | 22 |
| abstract_inverted_index.(such | 57 |
| abstract_inverted_index.Jarek | 17 |
| abstract_inverted_index.PRBG. | 180 |
| abstract_inverted_index.allow | 100 |
| abstract_inverted_index.based | 161 |
| abstract_inverted_index.bits. | 216 |
| abstract_inverted_index.close | 29, 170 |
| abstract_inverted_index.first | 167, 228 |
| abstract_inverted_index.joint | 133 |
| abstract_inverted_index.jumps | 177 |
| abstract_inverted_index.least | 265 |
| abstract_inverted_index.major | 40 |
| abstract_inverted_index.offer | 140 |
| abstract_inverted_index.other | 87 |
| abstract_inverted_index.state | 176 |
| abstract_inverted_index.third | 205 |
| abstract_inverted_index.three | 130 |
| abstract_inverted_index.time, | 10 |
| abstract_inverted_index.using | 105 |
| abstract_inverted_index.where | 189 |
| abstract_inverted_index.work, | 92 |
| abstract_inverted_index.(PRBG) | 160 |
| abstract_inverted_index.Apple. | 48 |
| abstract_inverted_index.Google | 46 |
| abstract_inverted_index.copies | 186 |
| abstract_inverted_index.data). | 64 |
| abstract_inverted_index.itself | 51 |
| abstract_inverted_index.little | 107 |
| abstract_inverted_index.offers | 23, 258 |
| abstract_inverted_index.second | 182, 242 |
| abstract_inverted_index.slight | 149, 236 |
| abstract_inverted_index.stream | 164 |
| abstract_inverted_index.switch | 197 |
| abstract_inverted_index.system | 21 |
| abstract_inverted_index.target | 112 |
| abstract_inverted_index.widely | 2 |
| abstract_inverted_index.applies | 175 |
| abstract_inverted_index.between | 143, 193 |
| abstract_inverted_index.copies. | 195 |
| abstract_inverted_index.employs | 184 |
| abstract_inverted_index.natural | 95 |
| abstract_inverted_index.numeral | 20 |
| abstract_inverted_index.obvious | 66 |
| abstract_inverted_index.optimal | 31 |
| abstract_inverted_index.problem | 70 |
| abstract_inverted_index.propose | 129 |
| abstract_inverted_index.provide | 54 |
| abstract_inverted_index.quality | 252 |
| abstract_inverted_index.storage | 117, 246 |
| abstract_inverted_index.However, | 77 |
| abstract_inverted_index.Internet | 5 |
| abstract_inverted_index.Recently | 14 |
| abstract_inverted_index.Security | 217 |
| abstract_inverted_index.assuming | 147 |
| abstract_inverted_index.ciphers. | 165 |
| abstract_inverted_index.consumes | 244 |
| abstract_inverted_index.deployed | 38 |
| abstract_inverted_index.encoding | 209 |
| abstract_inverted_index.function | 210 |
| abstract_inverted_index.improved | 25 |
| abstract_inverted_index.invented | 15 |
| abstract_inverted_index.modifies | 207 |
| abstract_inverted_index.original | 172 |
| abstract_inverted_index.proposed | 222 |
| abstract_inverted_index.quality. | 240 |
| abstract_inverted_index.requires | 79 |
| abstract_inverted_index.security | 56, 114, 144, 261 |
| abstract_inverted_index.solution | 67, 168 |
| abstract_inverted_index.storage. | 13 |
| abstract_inverted_index.switched | 192 |
| abstract_inverted_index.Facebook, | 45 |
| abstract_inverted_index.algorithm | 35 |
| abstract_inverted_index.bandwidth | 11 |
| abstract_inverted_index.companies | 42 |
| abstract_inverted_index.compcrypt | 206, 223, 229, 257 |
| abstract_inverted_index.depending | 213 |
| abstract_inverted_index.different | 141 |
| abstract_inverted_index.efficient | 233 |
| abstract_inverted_index.generator | 159 |
| abstract_inverted_index.low-level | 113 |
| abstract_inverted_index.possible. | 110 |
| abstract_inverted_index.solutions | 131, 139 |
| abstract_inverted_index.tradeoffs | 142 |
| abstract_inverted_index.algorithms | 224 |
| abstract_inverted_index.asymmetric | 19 |
| abstract_inverted_index.bitstream. | 76 |
| abstract_inverted_index.compressed | 75 |
| abstract_inverted_index.controlled | 178, 199 |
| abstract_inverted_index.efficiency | 26, 146, 219 |
| abstract_inverted_index.efficient. | 266 |
| abstract_inverted_index.encryption | 73, 104, 136 |
| abstract_inverted_index.evaluated. | 226 |
| abstract_inverted_index.properties | 96 |
| abstract_inverted_index.Compression | 0, 49 |
| abstract_inverted_index.algorithms: | 81 |
| abstract_inverted_index.compression | 84, 134, 150, 190, 239, 251 |
| abstract_inverted_index.encryption. | 89 |
| abstract_inverted_index.incorporate | 102 |
| abstract_inverted_index.investigate | 94 |
| abstract_inverted_index.lightweight | 163 |
| abstract_inverted_index.negligible. | 254 |
| abstract_inverted_index.particular, | 127 |
| abstract_inverted_index.transmitted | 63 |
| abstract_inverted_index.(compcrypt). | 137 |
| abstract_inverted_index.applications | 6 |
| abstract_inverted_index.compression. | 32 |
| abstract_inverted_index.cryptography | 108 |
| abstract_inverted_index.pseudorandom | 157 |
| abstract_inverted_index.transmission | 120 |
| abstract_inverted_index.authenticated | 103 |
| abstract_inverted_index.communication | 9, 115 |
| abstract_inverted_index.authentication | 61 |
| abstract_inverted_index.deterioration. | 151 |
| abstract_inverted_index.confidentiality | 59 |
| abstract_inverted_index.devices/sensors. | 125 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 7 |
| citation_normalized_percentile.value | 0.35678259 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |