{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:47:52Z","timestamp":1742993272222,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819959679"},{"type":"electronic","value":"9789819959686"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-5968-6_24","type":"book-chapter","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T23:04:42Z","timestamp":1694732682000},"page":"338-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Chaos-Based Construction of LWEs in Lattice-Based Cryptosystems"],"prefix":"10.1007","author":[{"given":"Nina","family":"Cai","sequence":"first","affiliation":[]},{"given":"Wuqiang","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Huiyi","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yihua","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Song","sequence":"additional","affiliation":[]},{"given":"Shanxiang","family":"Lyu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,15]]},"reference":[{"key":"24_CR1","unstructured":"Becker, D.: LWE-based encryption schemes and their applications in privacy-friendly data aggregation, Ph.D. thesis, Technische Universit\u00e4t Hamburg (2018)"},{"issue":"1","key":"24_CR2","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/BF02932576","volume":"27","author":"J Eichenauer","year":"1986","unstructured":"Eichenauer, J., Lehn, J.: A nonlinear congruential pseudo random number generator. Statistische Hefte 27(1), 315\u2013326 (1986)","journal-title":"Statistische Hefte"},{"key":"24_CR3","unstructured":"H, L.D.: Mathematical methods in large-scale computing units. Annu. Comput. Lab. Harvard Univ. 26, 141\u2013146 (1951), https:\/\/cir.nii.ac.jp\/crid\/1573387451173414912"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-93206-0_1","volume-title":"Information Security Practice and Experience","author":"Z Kaiwei","year":"2021","unstructured":"Kaiwei, Z., Ma, A., Shanxiang, L., Jiabo, W., Shuting, L.: Efficient Construction of\u00a0Public-Key Matrices in\u00a0Lattice-Based Cryptography: Chaos Strikes Again. In: Deng, R., Bao, F., Wang, G., Shen, J., Ryan, M., Meng, W., Wang, D. (eds.) ISPEC 2021. LNCS, vol. 13107, pp. 1\u201310. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-93206-0_1"},{"key":"24_CR5","doi-asserted-by":"publisher","unstructured":"Kocarev, L., Jakimoski, G.: Logistic map as a block encryption algorithm. Physics Letters A 289(4), 199\u2013206 (2001). https:\/\/doi.org\/10.1016\/S0375-9601(01)00609-0, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0375960101006090","DOI":"10.1016\/S0375-9601(01)00609-0"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"L\u2019Ecuyer, P.: History of uniform random number generation. In: 2017 Winter Simulation Conference (WSC), pp. 202\u2013230. IEEE (2017)","DOI":"10.1109\/WSC.2017.8247790"},{"issue":"225","key":"24_CR7","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1090\/S0025-5718-99-00996-5","volume":"68","author":"P L\u2019Ecuyer","year":"1999","unstructured":"L\u2019Ecuyer, P.: Tables of linear congruential generators of different sizes and good lattice structure. Math. Comput. 68(225), 249\u2013260 (1999)","journal-title":"Math. Comput."},{"issue":"3","key":"24_CR8","doi-asserted-by":"publisher","first-page":"1212","DOI":"10.1109\/18.915688","volume":"47","author":"D Micciancio","year":"2001","unstructured":"Micciancio, D.: The hardness of the closest vector problem with preprocessing. IEEE Trans. Inf. Theory 47(3), 1212\u20131215 (2001). https:\/\/doi.org\/10.1109\/18.915688","journal-title":"IEEE Trans. Inf. Theory"},{"key":"24_CR9","unstructured":"Naehrig,M., Alkim, E.J.e.a.: Frodokem. Tech. rep., National institution of Standards and Technology (2017)"},{"issue":"9","key":"24_CR10","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926\u2013934 (2006)","journal-title":"Image Vis. Comput."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Freire, L., P\u00e9rez-Gonz\u00e1lez, F.: Spread-spectrum vs. quantization-based data hiding: misconceptions and implications. In: Security, Steganography, and Watermarking of Multimedia Contents VII, vol.\u00a05681, pp. 341\u2013352. SPIE (2005)","DOI":"10.1117\/12.587790"},{"issue":"4","key":"24_CR12","doi-asserted-by":"publisher","first-page":"3670","DOI":"10.1103\/PhysRevE.51.3670","volume":"51","author":"S Phatak","year":"1995","unstructured":"Phatak, S., Rao, S.S.: Logistic map: a possible random-number generator. Phys. Rev. E 51(4), 3670 (1995)","journal-title":"Phys. Rev. E"},{"issue":"6","key":"24_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1\u201340 (2009)","journal-title":"J. ACM (JACM)"},{"issue":"30","key":"24_CR14","first-page":"11","volume":"7","author":"O Regev","year":"2010","unstructured":"Regev, O.: The learning with errors problem. Invited survey in CCC 7(30), 11 (2010)","journal-title":"Invited survey in CCC"},{"key":"24_CR15","doi-asserted-by":"publisher","unstructured":"Roy, S.S., Karmakar, A., Verbauwhede, I.: Ring-LWE: applications to cryptography and their efficient realization. In: Carlet, C., Hasan, M., Saraswat, V. (eds.) Security, Privacy, and Applied Cryptography Engineering. SPACE 2016. Lecture Notes in Computer Science, vol 10076. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49445-6_18","DOI":"10.1007\/978-3-319-49445-6_18"},{"issue":"10","key":"24_CR16","doi-asserted-by":"publisher","first-page":"960","DOI":"10.3390\/e21100960","volume":"21","author":"L Wang","year":"2019","unstructured":"Wang, L., Cheng, H.: Pseudorandom number generator based on logistic chaotic system. Entropy 21(10), 960 (2019)","journal-title":"Entropy"},{"issue":"1","key":"24_CR17","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/TCSVT.2020.2971590","volume":"31","author":"YG Wang","year":"2021","unstructured":"Wang, Y.G., Zhu, G., Li, J., Conti, M., Huang, J.: Defeating lattice-based data hiding code by decoding security hole. IEEE Trans. Circuits Syst. Video Technol. 31(1), 76\u201387 (2021). https:\/\/doi.org\/10.1109\/TCSVT.2020.2971590","journal-title":"IEEE Trans. Circuits Syst. Video Technol."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-5968-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:28:46Z","timestamp":1709810926000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-5968-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819959679","9789819959686"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-5968-6_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Harbin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2023.icpcsee.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"244","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}