{"id":"https://openalex.org/W163558546","doi":"https://doi.org/10.1007/978-3-642-21031-0_19","title":"On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs","display_name":"On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W163558546","doi":"https://doi.org/10.1007/978-3-642-21031-0_19","mag":"163558546"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-21031-0_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-21031-0_19","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070202014","display_name":"Bozhong Liu","orcid":"https://orcid.org/0000-0003-2839-1499"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bozhong Liu","raw_affiliation_strings":["School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","School of Information Security Engineering, Shanghai Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiaotong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101593687","display_name":"Zheng Gong","orcid":"https://orcid.org/0000-0002-1794-816X"},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Gong","raw_affiliation_strings":["School of Computer Science, South China Normal University, Guangzhou, China","School of Computer Science, South China Normal University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, South China Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I187400657"]},{"raw_affiliation_string":"School of Computer Science, South China Normal University, China","institution_ids":["https://openalex.org/I187400657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088072972","display_name":"Weidong Qiu","orcid":"https://orcid.org/0000-0001-6428-1655"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weidong Qiu","raw_affiliation_strings":["National Laboratory of Communication System Controlling Technology, NO.99, Hongxing Road, Jiaxing City, Zhejiang, China","School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","National Laboratory of Communication System Controlling Technology, Jiaxing City, China","School of Information Security Engineering, Shanghai Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"National Laboratory of Communication System Controlling Technology, NO.99, Hongxing Road, Jiaxing City, Zhejiang, China","institution_ids":[]},{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"National Laboratory of Communication System Controlling Technology, Jiaxing City, China","institution_ids":[]},{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiaotong University, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101910601","display_name":"Dong Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Zheng","raw_affiliation_strings":["School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","School of Information Security Engineering, Shanghai Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Information Security Engineering, Shanghai Jiaotong University, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070202014"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.6084,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.90181977,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"247","last_page":"256"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6861809492111206},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.6516257524490356},{"id":"https://openalex.org/keywords/bit","display_name":"Bit (key)","score":0.6440204381942749},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.628630518913269},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.5612460374832153},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.5508692860603333},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5131140947341919},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4119425415992737},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33616888523101807},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3217000961303711},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29390138387680054},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16974779963493347},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07336011528968811}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6861809492111206},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.6516257524490356},{"id":"https://openalex.org/C117011727","wikidata":"https://www.wikidata.org/wiki/Q1278488","display_name":"Bit (key)","level":2,"score":0.6440204381942749},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.628630518913269},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.5612460374832153},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.5508692860603333},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5131140947341919},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4119425415992737},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33616888523101807},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3217000961303711},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29390138387680054},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16974779963493347},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07336011528968811},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-21031-0_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-21031-0_19","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W46786753","https://openalex.org/W589333786","https://openalex.org/W1498892963","https://openalex.org/W1543396272","https://openalex.org/W1629301835","https://openalex.org/W1809690300","https://openalex.org/W1873852107","https://openalex.org/W1904699185","https://openalex.org/W1959383191","https://openalex.org/W2114286085","https://openalex.org/W2140330462","https://openalex.org/W2251439738","https://openalex.org/W2484860292","https://openalex.org/W2498149115","https://openalex.org/W2586046457","https://openalex.org/W4241072010"],"related_works":["https://openalex.org/W2943247777","https://openalex.org/W2740543340","https://openalex.org/W2371167013","https://openalex.org/W1582340598","https://openalex.org/W1541021634","https://openalex.org/W2794545997","https://openalex.org/W2584980534","https://openalex.org/W2182731056","https://openalex.org/W66917582","https://openalex.org/W1600949677"],"abstract_inverted_index":null,"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
