{"id":"https://openalex.org/W2505287184","doi":"https://doi.org/10.1007/978-3-319-30840-1_9","title":"Improved Impossible Differential Attack on Reduced-Round LBlock","display_name":"Improved Impossible Differential Attack on Reduced-Round LBlock","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2505287184","doi":"https://doi.org/10.1007/978-3-319-30840-1_9","mag":"2505287184"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-30840-1_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-30840-1_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100387235","display_name":"Ning Wang","orcid":"https://orcid.org/0009-0002-1920-4727"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ning Wang","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","School of Mathematics, Shandong University, Jinan, 250100, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100447919","display_name":"Xiaoyun Wang","orcid":"https://orcid.org/0000-0002-7846-269X"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyun Wang","raw_affiliation_strings":["Institute for Advanced Study, Tsinghua University, Beijing, 100084, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","School of Mathematics, Shandong University, Jinan, 250100, China"],"affiliations":[{"raw_affiliation_string":"Institute for Advanced Study, Tsinghua University, Beijing, 100084, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017743452","display_name":"Keting Jia","orcid":"https://orcid.org/0000-0002-6396-8882"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Keting Jia","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100387235"],"corresponding_institution_ids":["https://openalex.org/I154099455"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.6773,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.68466028,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"136","last_page":"152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/precomputation","display_name":"Precomputation","score":0.8642714619636536},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8235445618629456},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8088544607162476},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.608047366142273},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.5473270416259766},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.46213072538375854},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4280853569507599},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39722850918769836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35689833760261536},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34038907289505005},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.30152052640914917},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15636610984802246},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08659559488296509},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.07258924841880798}],"concepts":[{"id":"https://openalex.org/C159379195","wikidata":"https://www.wikidata.org/wiki/Q7239568","display_name":"Precomputation","level":3,"score":0.8642714619636536},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8235445618629456},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8088544607162476},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.608047366142273},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.5473270416259766},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.46213072538375854},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4280853569507599},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39722850918769836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35689833760261536},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34038907289505005},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30152052640914917},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15636610984802246},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08659559488296509},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.07258924841880798},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-30840-1_9","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-30840-1_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W45372631","https://openalex.org/W81438604","https://openalex.org/W126783431","https://openalex.org/W131718440","https://openalex.org/W177609475","https://openalex.org/W182571705","https://openalex.org/W351251939","https://openalex.org/W1541703086","https://openalex.org/W1592036464","https://openalex.org/W1598147411","https://openalex.org/W1868228027","https://openalex.org/W1894646615","https://openalex.org/W1928040504","https://openalex.org/W2027322477","https://openalex.org/W2075567233","https://openalex.org/W2084354916","https://openalex.org/W2107762801","https://openalex.org/W2141124495","https://openalex.org/W2168236595","https://openalex.org/W2198287532","https://openalex.org/W2504787357","https://openalex.org/W3030624396","https://openalex.org/W3206831756"],"related_works":["https://openalex.org/W126258643","https://openalex.org/W2157769033","https://openalex.org/W2096978683","https://openalex.org/W414359703","https://openalex.org/W2687399516","https://openalex.org/W2543067032","https://openalex.org/W2170398238","https://openalex.org/W3029113864","https://openalex.org/W2777135250","https://openalex.org/W1702528"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
