{"id":"https://openalex.org/W2963351393","doi":"https://doi.org/10.1007/s10623-018-0510-5","title":"Using Bernstein\u2013Vazirani algorithm to attack block ciphers","display_name":"Using Bernstein\u2013Vazirani algorithm to attack block ciphers","publication_year":2018,"publication_date":"2018-06-27","ids":{"openalex":"https://openalex.org/W2963351393","doi":"https://doi.org/10.1007/s10623-018-0510-5","mag":"2963351393"},"language":"en","primary_location":{"id":"doi:10.1007/s10623-018-0510-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-018-0510-5","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs10623-018-0510-5.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007%2Fs10623-018-0510-5.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036189156","display_name":"Huiqin Xie","orcid":"https://orcid.org/0000-0003-1466-3705"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huiqin Xie","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100321661","display_name":"Li Yang","orcid":"https://orcid.org/0000-0003-2091-0506"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Yang","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5036189156"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":2.7079,"has_fulltext":true,"cited_by_count":53,"citation_normalized_percentile":{"value":0.92543169,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"87","issue":"5","first_page":"1161","last_page":"1182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.9128242135047913},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.7904413938522339},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.737858235836029},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.688095211982727},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6830382347106934},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6748294234275818},{"id":"https://openalex.org/keywords/higher-order-differential-cryptanalysis","display_name":"Higher-order differential cryptanalysis","score":0.6468940377235413},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5349883437156677},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.49849414825439453},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.43101412057876587},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4289085865020752},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3466646075248718},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.26505446434020996}],"concepts":[{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.9128242135047913},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.7904413938522339},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.737858235836029},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.688095211982727},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6830382347106934},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6748294234275818},{"id":"https://openalex.org/C151607707","wikidata":"https://www.wikidata.org/wiki/Q11673206","display_name":"Higher-order differential cryptanalysis","level":5,"score":0.6468940377235413},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5349883437156677},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.49849414825439453},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.43101412057876587},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4289085865020752},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3466646075248718},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26505446434020996}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10623-018-0510-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-018-0510-5","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs10623-018-0510-5.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10623-018-0510-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-018-0510-5","pdf_url":"https://link.springer.com/content/pdf/10.1007%2Fs10623-018-0510-5.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2398241526","display_name":null,"funder_award_id":"61672517","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5249178904","display_name":null,"funder_award_id":"Grant No. 6","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2963351393.pdf","grobid_xml":"https://content.openalex.org/works/W2963351393.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W931761379","https://openalex.org/W1528065150","https://openalex.org/W1560564685","https://openalex.org/W1605416950","https://openalex.org/W1650819270","https://openalex.org/W1775977576","https://openalex.org/W1874863607","https://openalex.org/W1974544394","https://openalex.org/W1993688167","https://openalex.org/W2033016443","https://openalex.org/W2033216491","https://openalex.org/W2036919546","https://openalex.org/W2064939672","https://openalex.org/W2077300005","https://openalex.org/W2096050004","https://openalex.org/W2117584890","https://openalex.org/W2135084554","https://openalex.org/W2136751047","https://openalex.org/W2168676717","https://openalex.org/W2284942299","https://openalex.org/W2606893413","https://openalex.org/W2962811102","https://openalex.org/W2964038092","https://openalex.org/W2987687226","https://openalex.org/W3102528150","https://openalex.org/W6601981757"],"related_works":["https://openalex.org/W2557174342","https://openalex.org/W2996824228","https://openalex.org/W2950215720","https://openalex.org/W2562003519","https://openalex.org/W57168481","https://openalex.org/W2507153853","https://openalex.org/W4243188035","https://openalex.org/W209406412","https://openalex.org/W3189989475","https://openalex.org/W2151136913"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,19,36,77],"study":[4],"applications":[5],"of":[6,30,55,66,75,95,121,139,159],"Bernstein\u2013Vazirani":[7],"algorithm":[8,24,50,80,115,147],"and":[9,46,84,136],"present":[10,21],"several":[11],"new":[12,38,48,93],"methods":[13],"to":[14,51,81,167],"attack":[15],"block":[16],"ciphers.":[17],"Specifically,":[18],"first":[20],"a":[22,31,47,67,92,153],"quantum":[23,39,49,99],"for":[25,41],"finding":[26],"the":[27,42,56,63,106,109,118,149,157,169],"linear":[28,64,110,119],"structures":[29,65,111],"function.":[32,124],"Based":[33],"on":[34,105],"it,":[35,76],"propose":[37,91],"distinguishers":[40],"3-round":[43],"Feistel":[44],"scheme":[45],"recover":[52],"partial":[53],"key":[54],"Even\u2013Mansour":[57],"construction.":[58],"Afterwards,":[59],"by":[60,113],"observing":[61],"that":[62,108,163],"encryption":[68,150],"function":[69,151],"are":[70,116,142],"actually":[71],"high":[72],"probability":[73,101,138],"differentials":[74],"apply":[78],"our":[79,114,126,146],"differential":[82,86,96,102,161,170],"analysis":[83],"impossible":[85],"cryptanalysis":[87,162],"respectively.":[88],"We":[89],"also":[90,117],"kind":[94],"cryptanalysis,":[97,103],"called":[98],"small":[100],"based":[104],"fact":[107],"found":[112],"structure":[120],"each":[122],"component":[123],"To":[125],"knowledge,":[127],"no":[128],"similar":[129],"method":[130],"was":[131],"proposed":[132],"before.":[133],"The":[134],"efficiency":[135],"success":[137],"all":[140],"attacks":[141],"analyzed":[143],"rigorously.":[144],"Since":[145],"treats":[148],"as":[152],"whole,":[154],"it":[155,164],"avoid":[156],"disadvantage":[158],"traditional":[160],"is":[165],"difficult":[166],"extending":[168],"path.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
