{"id":"https://openalex.org/W3186536863","doi":"https://doi.org/10.1007/978-3-031-07082-2_1","title":"Key Guessing Strategies for\u00a0Linear Key-Schedule Algorithms in\u00a0Rectangle Attacks","display_name":"Key Guessing Strategies for\u00a0Linear Key-Schedule Algorithms in\u00a0Rectangle Attacks","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W3186536863","doi":"https://doi.org/10.1007/978-3-031-07082-2_1","mag":"3186536863"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-07082-2_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-07082-2_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038484143","display_name":"Xiaoyang Dong","orcid":"https://orcid.org/0000-0002-6723-6013"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyang Dong","raw_affiliation_strings":["Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022299291","display_name":"Lingyue Qin","orcid":"https://orcid.org/0000-0003-3312-2189"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingyue Qin","raw_affiliation_strings":["Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027649882","display_name":"Siwei Sun","orcid":"https://orcid.org/0000-0002-3058-2377"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siwei Sun","raw_affiliation_strings":["School of Cryptology, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cryptology, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100447919","display_name":"Xiaoyun Wang","orcid":"https://orcid.org/0000-0002-7846-269X"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyun Wang","raw_affiliation_strings":["Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","School of Cyber Science and Technology, Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5038484143"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":9.6005,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.9849802,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"3","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.8769959211349487},{"id":"https://openalex.org/keywords/rectangle","display_name":"Rectangle","score":0.822980523109436},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7609952688217163},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.6797828674316406},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.5791544914245605},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4851570725440979},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46492528915405273},{"id":"https://openalex.org/keywords/time-complexity","display_name":"Time complexity","score":0.44449084997177124},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42429643869400024},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.22801226377487183},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.22795888781547546},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1804088056087494},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08570542931556702},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.06617361307144165}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.8769959211349487},{"id":"https://openalex.org/C2781302577","wikidata":"https://www.wikidata.org/wiki/Q209","display_name":"Rectangle","level":2,"score":0.822980523109436},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7609952688217163},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.6797828674316406},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.5791544914245605},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4851570725440979},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46492528915405273},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.44449084997177124},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42429643869400024},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22801226377487183},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.22795888781547546},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1804088056087494},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08570542931556702},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.06617361307144165},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-07082-2_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-07082-2_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W52191336","https://openalex.org/W183217503","https://openalex.org/W197228877","https://openalex.org/W1427832936","https://openalex.org/W1515958737","https://openalex.org/W1518029257","https://openalex.org/W1518406241","https://openalex.org/W1538476572","https://openalex.org/W1540066842","https://openalex.org/W1563341929","https://openalex.org/W1597699498","https://openalex.org/W1598147411","https://openalex.org/W1608613499","https://openalex.org/W1629301835","https://openalex.org/W1685770595","https://openalex.org/W1868228027","https://openalex.org/W1870015754","https://openalex.org/W1883151075","https://openalex.org/W1901931695","https://openalex.org/W1958084802","https://openalex.org/W1965570021","https://openalex.org/W2091612798","https://openalex.org/W2095934050","https://openalex.org/W2103641030","https://openalex.org/W2119874003","https://openalex.org/W2145038746","https://openalex.org/W2496427131","https://openalex.org/W2504919933","https://openalex.org/W2584778576","https://openalex.org/W2585018408","https://openalex.org/W2730078344","https://openalex.org/W2741840250","https://openalex.org/W2795355075","https://openalex.org/W2898254287","https://openalex.org/W2900658357","https://openalex.org/W2941076300","https://openalex.org/W2952350086","https://openalex.org/W2982416332","https://openalex.org/W2990670118","https://openalex.org/W2990961241","https://openalex.org/W2992337242","https://openalex.org/W3005554792","https://openalex.org/W3021104626","https://openalex.org/W3037868904","https://openalex.org/W3037997309","https://openalex.org/W3081737099","https://openalex.org/W3095375142","https://openalex.org/W3096993201","https://openalex.org/W3110785930","https://openalex.org/W3146780285","https://openalex.org/W3172069918","https://openalex.org/W3186008327","https://openalex.org/W3187429275","https://openalex.org/W3203846825","https://openalex.org/W4232855578","https://openalex.org/W4239460744","https://openalex.org/W4243092246","https://openalex.org/W4243211329","https://openalex.org/W4254435982","https://openalex.org/W4255264941","https://openalex.org/W4255288622"],"related_works":["https://openalex.org/W2242098268","https://openalex.org/W2913089845","https://openalex.org/W2063135098","https://openalex.org/W1966261337","https://openalex.org/W2184851270","https://openalex.org/W2763024976","https://openalex.org/W2276414476","https://openalex.org/W4221071187","https://openalex.org/W2009537710","https://openalex.org/W2520596801"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
