{"id":"https://openalex.org/W54089079","doi":"https://doi.org/10.1007/978-3-642-39059-3_17","title":"Improved Boomerang Attacks on SM3","display_name":"Improved Boomerang Attacks on SM3","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W54089079","doi":"https://doi.org/10.1007/978-3-642-39059-3_17","mag":"54089079"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-39059-3_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-39059-3_17","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055423340","display_name":"Dongxia Bai","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongxia Bai","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101723985","display_name":"Hongbo Yu","orcid":"https://orcid.org/0000-0001-8500-5991"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongbo Yu","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068633811","display_name":"Gaoli Wang","orcid":"https://orcid.org/0000-0002-2121-9306"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaoli Wang","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University, Shanghai, 201620, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University, Shanghai, 201620, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100447919","display_name":"Xiaoyun Wang","orcid":"https://orcid.org/0000-0002-7846-269X"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyun Wang","raw_affiliation_strings":["Institute for Advanced Study, Tsinghua University, Beijing, 100084, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","School of Mathematics, Shandong University, Jinan, 250100, China"],"affiliations":[{"raw_affiliation_string":"Institute for Advanced Study, Tsinghua University, Beijing, 100084, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055423340"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.7156,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.90233256,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"251","last_page":"266"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7241446375846863},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6258519887924194},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5525081157684326},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5303516983985901},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.49194881319999695},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.4844991862773895},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3381776809692383},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.15457728505134583},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07537564635276794}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7241446375846863},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6258519887924194},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5525081157684326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5303516983985901},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.49194881319999695},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.4844991862773895},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3381776809692383},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.15457728505134583},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07537564635276794}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-39059-3_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-39059-3_17","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-00922228v1","is_oa":false,"landing_page_url":"https://inria.hal.science/hal-00922228","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACISP 2013 - 18th Australasian Conference Information Security and Privacy, Jul 2013, Brisbane, Australia. pp.251-266, &#x27E8;10.1007/978-3-642-39059-3_17&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W6911803","https://openalex.org/W15461156","https://openalex.org/W52191336","https://openalex.org/W63858338","https://openalex.org/W141830613","https://openalex.org/W157125546","https://openalex.org/W203744710","https://openalex.org/W571925191","https://openalex.org/W1503389453","https://openalex.org/W1511374591","https://openalex.org/W1515958737","https://openalex.org/W1521253015","https://openalex.org/W1525782700","https://openalex.org/W1540066842","https://openalex.org/W1558518955","https://openalex.org/W1656731780","https://openalex.org/W1870015754","https://openalex.org/W2081426691","https://openalex.org/W2103239853","https://openalex.org/W2133945600","https://openalex.org/W2141153333","https://openalex.org/W2177399963","https://openalex.org/W2400914681","https://openalex.org/W2479809369","https://openalex.org/W2485621794","https://openalex.org/W2490195800","https://openalex.org/W2490262601","https://openalex.org/W2494159333","https://openalex.org/W2495889793","https://openalex.org/W2502627125","https://openalex.org/W2503837195","https://openalex.org/W2593352200"],"related_works":["https://openalex.org/W2157568185","https://openalex.org/W1674074891","https://openalex.org/W1487949331","https://openalex.org/W1987209102","https://openalex.org/W2613610283","https://openalex.org/W2949619078","https://openalex.org/W2242320573","https://openalex.org/W2106698019","https://openalex.org/W2221520808","https://openalex.org/W1974544592"],"abstract_inverted_index":null,"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
