{"id":"https://openalex.org/W1428255035","doi":"https://doi.org/10.1007/978-3-642-34704-7_18","title":"Cryptanalysis of Reduced-Round KLEIN Block Cipher","display_name":"Cryptanalysis of Reduced-Round KLEIN Block Cipher","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W1428255035","doi":"https://doi.org/10.1007/978-3-642-34704-7_18","mag":"1428255035"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-34704-7_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-34704-7_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100828473","display_name":"Xiaoli Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoli Yu","raw_affiliation_strings":["Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China","State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, 100190, P.R. China","State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, Beijing, P.R. China,Graduate University of Chinese Academy of Sciences, Beijing, P.R. China#TAB#"],"affiliations":[{"raw_affiliation_string":"Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, Beijing, P.R. China,Graduate University of Chinese Academy of Sciences, Beijing, P.R. China#TAB#","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, 100190, P.R. China","State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100382134","display_name":"Yanjun Li","orcid":"https://orcid.org/0000-0003-3314-3764"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanjun Li","raw_affiliation_strings":["State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, 100190, P.R. China","State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100616189","display_name":"Lei Zhang","orcid":"https://orcid.org/0000-0002-2839-8693"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Zhang","raw_affiliation_strings":["State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, 100190, P.R. China","State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, 100190, P.R. China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100828473"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210165038"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.9031,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.86998509,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"237","last_page":"250"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.776100218296051},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.76353919506073},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5778038501739502},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.5400233268737793},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.47939038276672363},{"id":"https://openalex.org/keywords/cbc-mac","display_name":"CBC-MAC","score":0.44749000668525696},{"id":"https://openalex.org/keywords/two-square-cipher","display_name":"Two-square cipher","score":0.43921148777008057},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.43155986070632935},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.42907679080963135},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3943547010421753},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.3470524549484253},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3167113661766052},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.29832541942596436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.292868971824646},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.14660370349884033},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1313614547252655},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12649783492088318},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.08625417947769165}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.776100218296051},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76353919506073},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5778038501739502},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.5400233268737793},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.47939038276672363},{"id":"https://openalex.org/C156529985","wikidata":"https://www.wikidata.org/wiki/Q2736227","display_name":"CBC-MAC","level":4,"score":0.44749000668525696},{"id":"https://openalex.org/C60153865","wikidata":"https://www.wikidata.org/wiki/Q1124307","display_name":"Two-square cipher","level":5,"score":0.43921148777008057},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.43155986070632935},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.42907679080963135},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3943547010421753},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.3470524549484253},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3167113661766052},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.29832541942596436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.292868971824646},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.14660370349884033},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1313614547252655},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12649783492088318},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.08625417947769165}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-34704-7_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-34704-7_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W37385681","https://openalex.org/W45372631","https://openalex.org/W1490106672","https://openalex.org/W1500584382","https://openalex.org/W1501856114","https://openalex.org/W1511842436","https://openalex.org/W1512497838","https://openalex.org/W1522919234","https://openalex.org/W1542121656","https://openalex.org/W1556212265","https://openalex.org/W1568817903","https://openalex.org/W1572300106","https://openalex.org/W1575062508","https://openalex.org/W1581134854","https://openalex.org/W1587120902","https://openalex.org/W1596841000","https://openalex.org/W1607874478","https://openalex.org/W1894646615","https://openalex.org/W1897454360","https://openalex.org/W1904699185","https://openalex.org/W2109265351","https://openalex.org/W2161571881","https://openalex.org/W2234576048","https://openalex.org/W2912272895"],"related_works":["https://openalex.org/W3123145532","https://openalex.org/W2653150070","https://openalex.org/W3200403887","https://openalex.org/W1565579953","https://openalex.org/W3027607391","https://openalex.org/W2083898372","https://openalex.org/W2128514748","https://openalex.org/W1530125463","https://openalex.org/W4287038101","https://openalex.org/W744314595"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
