{"id":"https://openalex.org/W1570466740","doi":"https://doi.org/10.1007/3-540-36552-4_11","title":"Consistent Differential Patterns of Rijndael","display_name":"Consistent Differential Patterns of Rijndael","publication_year":2003,"publication_date":"2003-01-01","ids":{"openalex":"https://openalex.org/W1570466740","doi":"https://doi.org/10.1007/3-540-36552-4_11","mag":"1570466740"},"language":"en","primary_location":{"id":"doi:10.1007/3-540-36552-4_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-36552-4_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033026120","display_name":"Beomsik Song","orcid":null},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Beomsik Song","raw_affiliation_strings":["Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","Centre for Computer Security, Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer Security, Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073611240","display_name":"Jennifer Seberry","orcid":"https://orcid.org/0000-0002-9558-4293"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jennifer Seberry","raw_affiliation_strings":["Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","Centre for Computer Security, Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer Security, Research School of Information Technology and Computer Science, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5033026120"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14118829,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"149","last_page":"163"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.9482550024986267},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.7794157862663269},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.702987015247345},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6368042826652527},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.558945894241333},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.5540307760238647},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5096933841705322},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.4666725695133209},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4530453681945801},{"id":"https://openalex.org/keywords/two-square-cipher","display_name":"Two-square cipher","score":0.4484283924102783},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.43825381994247437},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.43526214361190796},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4173324704170227},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4022107422351837},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3593902885913849},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23178809881210327},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.21668383479118347},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06054571270942688}],"concepts":[{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.9482550024986267},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.7794157862663269},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.702987015247345},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6368042826652527},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.558945894241333},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.5540307760238647},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5096933841705322},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.4666725695133209},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4530453681945801},{"id":"https://openalex.org/C60153865","wikidata":"https://www.wikidata.org/wiki/Q1124307","display_name":"Two-square cipher","level":5,"score":0.4484283924102783},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.43825381994247437},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.43526214361190796},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4173324704170227},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4022107422351837},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3593902885913849},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23178809881210327},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.21668383479118347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06054571270942688},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/3-540-36552-4_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-36552-4_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W3926427","https://openalex.org/W45309531","https://openalex.org/W85295516","https://openalex.org/W158047812","https://openalex.org/W1587120902","https://openalex.org/W2109265351"],"related_works":["https://openalex.org/W1507705751","https://openalex.org/W1582925429","https://openalex.org/W1974355178","https://openalex.org/W1601440354","https://openalex.org/W2653150070","https://openalex.org/W4321783378","https://openalex.org/W2156908834","https://openalex.org/W2128514748","https://openalex.org/W2129590514","https://openalex.org/W2591642191"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
