{"id":"https://openalex.org/W1501856114","doi":"https://doi.org/10.1007/978-3-540-76788-6_19","title":"New Results on Impossible Differential Cryptanalysis of Reduced AES","display_name":"New Results on Impossible Differential Cryptanalysis of Reduced AES","publication_year":2007,"publication_date":"2007-11-12","ids":{"openalex":"https://openalex.org/W1501856114","doi":"https://doi.org/10.1007/978-3-540-76788-6_19","mag":"1501856114"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-76788-6_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-76788-6_19","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100459879","display_name":"Wentao Zhang","orcid":"https://orcid.org/0000-0003-4869-6564"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wentao Zhang","raw_affiliation_strings":["State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing 100049, P.R. China","State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, P.R. China#TAB#"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing 100049, P.R. China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, P.R. China#TAB#","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, P.R. China","State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101790997","display_name":"Dengguo Feng","orcid":"https://orcid.org/0000-0002-8515-7124"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dengguo Feng","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, P.R. China","State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100459879"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210165038"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":4.3509,"has_fulltext":false,"cited_by_count":75,"citation_normalized_percentile":{"value":0.95453828,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"239","last_page":"250"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.6831641793251038},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.6444825530052185},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.6102520823478699},{"id":"https://openalex.org/keywords/higher-order-differential-cryptanalysis","display_name":"Higher-order differential cryptanalysis","score":0.593482255935669},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5704110264778137},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.5696340799331665},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5624158978462219},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5344502329826355},{"id":"https://openalex.org/keywords/slide-attack","display_name":"Slide attack","score":0.46891602873802185},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.46777239441871643},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4215492606163025},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.42111027240753174},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.41411447525024414},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3930703401565552},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.34605124592781067},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3325817584991455},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3242870271205902},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.21630221605300903},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.08028507232666016},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07828852534294128}],"concepts":[{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.6831641793251038},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.6444825530052185},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.6102520823478699},{"id":"https://openalex.org/C151607707","wikidata":"https://www.wikidata.org/wiki/Q11673206","display_name":"Higher-order differential cryptanalysis","level":5,"score":0.593482255935669},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5704110264778137},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.5696340799331665},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5624158978462219},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5344502329826355},{"id":"https://openalex.org/C89694405","wikidata":"https://www.wikidata.org/wiki/Q7540343","display_name":"Slide attack","level":5,"score":0.46891602873802185},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.46777239441871643},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4215492606163025},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.42111027240753174},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.41411447525024414},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3930703401565552},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.34605124592781067},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3325817584991455},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3242870271205902},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.21630221605300903},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.08028507232666016},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07828852534294128},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-76788-6_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-76788-6_19","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W3926427","https://openalex.org/W18798069","https://openalex.org/W85295516","https://openalex.org/W1493204363","https://openalex.org/W1511374591","https://openalex.org/W1541703086","https://openalex.org/W1587120902","https://openalex.org/W1637140211","https://openalex.org/W1794421227","https://openalex.org/W1974355178","https://openalex.org/W2495889793","https://openalex.org/W2514781489","https://openalex.org/W2561675875"],"related_works":["https://openalex.org/W2557174342","https://openalex.org/W2950215720","https://openalex.org/W2151136913","https://openalex.org/W2653150070","https://openalex.org/W2066597764","https://openalex.org/W3205952566","https://openalex.org/W2399978900","https://openalex.org/W1994316182","https://openalex.org/W4389258785","https://openalex.org/W1501856114"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
