{"id":"https://openalex.org/W2549036577","doi":"https://doi.org/10.1007/978-3-319-49151-6_1","title":"Cryptanalysis of Midori128 Using Impossible Differential Techniques","display_name":"Cryptanalysis of Midori128 Using Impossible Differential Techniques","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2549036577","doi":"https://doi.org/10.1007/978-3-319-49151-6_1","mag":"2549036577"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-49151-6_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-49151-6_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100676092","display_name":"Zhan Chen","orcid":"https://orcid.org/0009-0006-3127-9958"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhan Chen","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102992234","display_name":"Huaifeng Chen","orcid":"https://orcid.org/0000-0002-3489-3586"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaifeng Chen","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","School of Mathematics, Shandong University, Jinan, 250100, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040504381","display_name":"Xiaoyun Wang","orcid":"https://orcid.org/0000-0002-5041-7264"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyun Wang","raw_affiliation_strings":["Institute of Advanced Study, Tsinghua University, Beijing, 100084, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","School of Mathematics, Shandong University, Jinan, 250100, China"],"affiliations":[{"raw_affiliation_string":"Institute of Advanced Study, Tsinghua University, Beijing, 100084, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040504381"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I99065089"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.6773,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7117455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8323700428009033},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.800471842288971},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6053648591041565},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.5696184039115906},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5605596899986267},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.5571917295455933},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.5202987790107727},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.5011763572692871},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.48804178833961487},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.46267861127853394},{"id":"https://openalex.org/keywords/slide-attack","display_name":"Slide attack","score":0.4446217715740204},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4416358470916748},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37137770652770996},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.36574405431747437},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33347415924072266},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.2803219258785248},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.271635502576828},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15054115653038025},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.13139086961746216},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09878045320510864}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8323700428009033},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.800471842288971},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6053648591041565},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.5696184039115906},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5605596899986267},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.5571917295455933},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.5202987790107727},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.5011763572692871},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.48804178833961487},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.46267861127853394},{"id":"https://openalex.org/C89694405","wikidata":"https://www.wikidata.org/wiki/Q7540343","display_name":"Slide attack","level":5,"score":0.4446217715740204},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4416358470916748},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37137770652770996},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.36574405431747437},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33347415924072266},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.2803219258785248},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.271635502576828},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15054115653038025},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.13139086961746216},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09878045320510864}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-49151-6_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-49151-6_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W153516704","https://openalex.org/W182445978","https://openalex.org/W1522919234","https://openalex.org/W1541703086","https://openalex.org/W1541853791","https://openalex.org/W1545756401","https://openalex.org/W1565705707","https://openalex.org/W1569252980","https://openalex.org/W1598147411","https://openalex.org/W1607874478","https://openalex.org/W1894646615","https://openalex.org/W1904699185","https://openalex.org/W1974355178","https://openalex.org/W2087928947","https://openalex.org/W2141124495","https://openalex.org/W2156497336","https://openalex.org/W2293947265","https://openalex.org/W2401608417","https://openalex.org/W2578779108","https://openalex.org/W2771007556"],"related_works":["https://openalex.org/W3159094001","https://openalex.org/W2348617949","https://openalex.org/W1565705707","https://openalex.org/W1791039952","https://openalex.org/W1582925429","https://openalex.org/W3205952566","https://openalex.org/W2151136913","https://openalex.org/W2653150070","https://openalex.org/W1216252982","https://openalex.org/W2169232716"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
