{"id":"https://openalex.org/W2234103503","doi":"https://doi.org/10.1007/978-3-319-19962-7_2","title":"Cryptanalysis of Reduced-Round Whirlwind","display_name":"Cryptanalysis of Reduced-Round Whirlwind","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2234103503","doi":"https://doi.org/10.1007/978-3-319-19962-7_2","mag":"2234103503"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-19962-7_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-19962-7_2","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102330464","display_name":"Bingke Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bingke Ma","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100717163","display_name":"Bao Li","orcid":"https://orcid.org/0000-0003-2446-9367"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bao Li","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002574845","display_name":"Ronglin Hao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ronglin Hao","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, 230027, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, 230027, China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100643633","display_name":"Xiaoqian Li","orcid":"https://orcid.org/0000-0002-7079-514X"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoqian Li","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102330464"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3414,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.56762033,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"20","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/whirlwind","display_name":"Whirlwind","score":0.8706256151199341},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8111138343811035},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.7503484487533569},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.7398136258125305},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.706010103225708},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.6198796629905701},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.5088975429534912},{"id":"https://openalex.org/keywords/md5","display_name":"MD5","score":0.4988698959350586},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4974983036518097},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.451975554227829},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.42025265097618103},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.382114440202713},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.330188512802124},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.08995476365089417},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08317604660987854}],"concepts":[{"id":"https://openalex.org/C70816948","wikidata":"https://www.wikidata.org/wiki/Q1192097","display_name":"Whirlwind","level":2,"score":0.8706256151199341},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8111138343811035},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.7503484487533569},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.7398136258125305},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.706010103225708},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.6198796629905701},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.5088975429534912},{"id":"https://openalex.org/C157172786","wikidata":"https://www.wikidata.org/wiki/Q185235","display_name":"MD5","level":3,"score":0.4988698959350586},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4974983036518097},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.451975554227829},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.42025265097618103},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.382114440202713},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.330188512802124},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.08995476365089417},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08317604660987854},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-19962-7_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-19962-7_2","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W17122945","https://openalex.org/W25119858","https://openalex.org/W41296744","https://openalex.org/W163970851","https://openalex.org/W170950682","https://openalex.org/W286115074","https://openalex.org/W1433390310","https://openalex.org/W1483908684","https://openalex.org/W1530387410","https://openalex.org/W1547537489","https://openalex.org/W1549228503","https://openalex.org/W1552695992","https://openalex.org/W1556212265","https://openalex.org/W1572300106","https://openalex.org/W1596861772","https://openalex.org/W1600432225","https://openalex.org/W1603433154","https://openalex.org/W1660562555","https://openalex.org/W1766319578","https://openalex.org/W1814882979","https://openalex.org/W1902962512","https://openalex.org/W1977329611","https://openalex.org/W2079047661","https://openalex.org/W2109766996","https://openalex.org/W2117062458","https://openalex.org/W2119153286","https://openalex.org/W2136320902","https://openalex.org/W2217700236","https://openalex.org/W2234103503","https://openalex.org/W2406962301","https://openalex.org/W2612691132","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2782107767","https://openalex.org/W1582767677","https://openalex.org/W2476475994","https://openalex.org/W2909045450","https://openalex.org/W2121021336","https://openalex.org/W2890980880","https://openalex.org/W4210533431","https://openalex.org/W605282644","https://openalex.org/W1487949331","https://openalex.org/W2222211799"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
