{"id":"https://openalex.org/W1542121656","doi":"https://doi.org/10.1007/978-3-642-12827-1_2","title":"Integral Attacks on Reduced-Round ARIA Block Cipher","display_name":"Integral Attacks on Reduced-Round ARIA Block Cipher","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1542121656","doi":"https://doi.org/10.1007/978-3-642-12827-1_2","mag":"1542121656"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-12827-1_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-12827-1_2","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100382119","display_name":"Yanjun Li","orcid":"https://orcid.org/0000-0002-6277-4189"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanjun Li","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, Beijing, 100070, P.R. China","State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China","State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, P.R. Chin "],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, Beijing, 100070, P.R. China","institution_ids":["https://openalex.org/I202334528"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, P.R. Chin ","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China","State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, P.R. Chin "],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, P.R. Chin ","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100603177","display_name":"Lei Zhang","orcid":"https://orcid.org/0000-0002-2949-5532"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Zhang","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China","State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, P.R. Chin "],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, P.R. China, Graduate University of Chinese Academy of Sciences, Beijing, P.R. Chin ","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100382119"],"corresponding_institution_ids":["https://openalex.org/I202334528","https://openalex.org/I4210128818","https://openalex.org/I4210156404"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.5489,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.90304051,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7416964769363403},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6685314178466797},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4507255554199219},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.4218358099460602},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.330907940864563},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.30051618814468384},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28357869386672974},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.07529968023300171}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7416964769363403},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6685314178466797},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4507255554199219},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.4218358099460602},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.330907940864563},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30051618814468384},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28357869386672974},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.07529968023300171},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-12827-1_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-12827-1_2","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1503864966","https://openalex.org/W1506585282","https://openalex.org/W1581134854","https://openalex.org/W1587120902","https://openalex.org/W2067040124","https://openalex.org/W2108286985","https://openalex.org/W2109265351","https://openalex.org/W2483079083","https://openalex.org/W2493429532","https://openalex.org/W2495889793","https://openalex.org/W2912272895","https://openalex.org/W2917630406","https://openalex.org/W3147534920"],"related_works":["https://openalex.org/W1979597421","https://openalex.org/W2007980826","https://openalex.org/W4245490552","https://openalex.org/W4225152035","https://openalex.org/W2061531152","https://openalex.org/W3002753104","https://openalex.org/W2077600819","https://openalex.org/W1587224694","https://openalex.org/W2911598644","https://openalex.org/W2101387633"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
