{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:40:03Z","timestamp":1755862803451,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T00:00:00Z","timestamp":1706832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,2,2]]},"DOI":"10.1145\/3651671.3651754","type":"proceedings-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T18:55:50Z","timestamp":1717786550000},"page":"36-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Efficient Stream Cipher Design in Big Data Environment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6665-7012","authenticated-orcid":false,"given":"Shilin","family":"Liu","sequence":"first","affiliation":[{"name":"Network Information Security Laboratory, Yanbian University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0769-2591","authenticated-orcid":false,"given":"Zhexue","family":"Jin","sequence":"additional","affiliation":[{"name":"Network Information Security Laboratory, Yanbian University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4747-4225","authenticated-orcid":false,"given":"Yongzhen","family":"Li","sequence":"additional","affiliation":[{"name":"Network Information Security Laboratory, Yanbian University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"volume-title":"VANSTONE S A. Handbook of applied cryptography [M]. NW BocaRaton, FL","year":"2018","key":"e_1_3_2_1_1_1","unstructured":"MENEZES A J, VAN OORSCHOT P C, VANSTONE S A. Handbook of applied cryptography [M]. NW BocaRaton, FL, USA: CRC press, 2018:191\u2013122."},{"key":"e_1_3_2_1_2_1","first-page":"16","volume":"2021","author":"Wang Yiting Yin Xudong","unstructured":"Wang Yiting, Yin Xudong. Symmetric Cryptography and Asymmetric Cryptography [J]. Office Automation,2021,26(6):16-17,42.","journal-title":"Office Automation"},{"key":"e_1_3_2_1_3_1","unstructured":"Zhong Yue Gu Jie-ming CAO Hong-lin. Survey on Lightweight Block Ciphers [J]. Computer Science 2023:50(09)."},{"key":"e_1_3_2_1_4_1","unstructured":"Zhang Fan. Stream cipher algorithm analysis and related problems Research [D] 2016."},{"key":"e_1_3_2_1_5_1","first-page":"128","volume":"14","author":"Allu S.N.","year":"2012","unstructured":"Allu,S.N.,Tentu,&A.N.Quantum Cryptanalysis on A5\/1 Stream cipher.International Journal of Computer Information Systems and Industrial Management Applications, 2012,14:128-137.","journal-title":"International Journal of Computer Information Systems and Industrial Management Applications"},{"key":"e_1_3_2_1_6_1","first-page":"1603","volume":"104","author":"Hoki Jin","year":"2021","unstructured":"Hoki,Jin,Sakamoto,Kosei,Minematsu,Kazuhiko,Isobe,&Takanori. Practical Integral Distinguishers on SNOW 3G and KCipher-2.Basic Proceedings of Electronic Communications and Computer Science, E104A, 2021, 11:1603-1611.","journal-title":"Basic Proceedings of Electronic Communications and Computer Science"},{"issue":"3","key":"e_1_3_2_1_7_1","first-page":"695","volume":"37","author":"Li Mu Cui Yijun","year":"2012","unstructured":"Li Mu, Cui Yijun, Ni Ziying Design and implementation of lightweight Hardware for ZUC-256 Stream cipher [J]. Data Acquisition and Processing, 2012,37(3):695-702.","journal-title":"Data Acquisition and Processing"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Madarro-Capo Evaristo Jose Legon-Perez Carlos Miguel Rojas Omar Sosa-Gomez &Guillermo.. Information Theory Based Evaluation of the RC4 Stream Cipher Outputs.ENTROPY 2021 23(7):896.","DOI":"10.3390\/e23070896"},{"key":"e_1_3_2_1_9_1","first-page":"160","volume":"2006","author":"Guo Feng ZHUANG","unstructured":"Guo Feng, ZHUANG Yiqi. Security Analysis of Bluetooth E0 Encryption Algorithm [J]. Journal of University of Electronic Science and Technology of China,2006,35(2):160-163.","journal-title":"Journal of University of Electronic Science and Technology of China"},{"key":"e_1_3_2_1_10_1","first-page":"1171","volume":"2021","author":"Wang Ziheng","unstructured":"Wang,,Ziheng,et al.A hybrid CPU\/GPU Scheme for Optimizing ChaCha20 Stream Cipher,2021,1171-1178.","journal-title":"Stream Cipher"},{"key":"e_1_3_2_1_11_1","first-page":"585","volume":"2003","unstructured":"Wu Wen-ling, MA Hong-tai, FENG Deng-guo. Security analysis of Korean Encryption Standard[J]. Acta Electronica Sinica,2003,31(4):585-588.","journal-title":"Acta Electronica Sinica"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Anand Mayuresh Vivekanand Targhi Ehsan Ebrahimi Tabia Gelo Noel Unruh &Dominique.Post-Quantum Security of the CBC CFB OFB CTR and XTS Modes of Operation 2016.","DOI":"10.1007\/978-3-319-29360-8_4"},{"key":"e_1_3_2_1_13_1","first-page":"84","volume-title":"Chinese Society of Electronic Education. Proceedings of Higher Education Branch of China Electronic Education Society 2011","author":"Deng Yuanqing Xie Tao","year":"2011","unstructured":"Deng Yuanqing, Xie Tao, Shi Hui Research on Key Avalanche Effect Characteristics of AES Algorithm [C]\/\/ Chinese Society of Electronic Education. Proceedings of Higher Education Branch of China Electronic Education Society 2011.2011:84-89."},{"key":"e_1_3_2_1_14_1","volume":"2023","author":"Jin Min","unstructured":"Jin,,Min.Computer Network Information Security and Protection Strategy Based on Big Data Environment [J].International Journal of Information Technology and Systems Methods,2023:16(2).","journal-title":"International Journal of Information Technology and Systems Methods"}],"event":{"name":"ICMLC 2024: 2024 16th International Conference on Machine Learning and Computing","acronym":"ICMLC 2024","location":"Shenzhen China"},"container-title":["Proceedings of the 2024 16th International Conference on Machine Learning and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651671.3651754","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651671.3651754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:17:26Z","timestamp":1755861446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651671.3651754"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,2]]},"references-count":14,"alternative-id":["10.1145\/3651671.3651754","10.1145\/3651671"],"URL":"https:\/\/doi.org\/10.1145\/3651671.3651754","relation":{},"subject":[],"published":{"date-parts":[[2024,2,2]]},"assertion":[{"value":"2024-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}