{"id":"https://openalex.org/W2046963243","doi":"https://doi.org/10.1007/s11390-007-9047-1","title":"Cryptanalysis of Achterbahn-Version 1 and -Version 2","display_name":"Cryptanalysis of Achterbahn-Version 1 and -Version 2","publication_year":2007,"publication_date":"2007-05-01","ids":{"openalex":"https://openalex.org/W2046963243","doi":"https://doi.org/10.1007/s11390-007-9047-1","mag":"2046963243"},"language":"en","primary_location":{"id":"doi:10.1007/s11390-007-9047-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11390-007-9047-1","pdf_url":null,"source":{"id":"https://openalex.org/S161516442","display_name":"Journal of Computer Science and Technology","issn_l":"1000-9000","issn":["1000-9000","1860-4749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Science and Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101704788","display_name":"X. L. Huang","orcid":"https://orcid.org/0000-0002-8938-8552"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiao-Li Huang","raw_affiliation_strings":["Graduate University of Chinese Academy of Sciences, Beijing, 100039, China","The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100080, China","The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences Beijing, China and Graduate University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Graduate University of Chinese Academy of Sciences, Beijing, 100039, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100080, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences Beijing, China and Graduate University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101611530","display_name":"Chuan-Kun Wu","orcid":"https://orcid.org/0000-0002-5620-8914"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuan-Kun Wu","raw_affiliation_strings":["The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100080, China","The State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, 100080, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"The State Key Laboratory of Information Security, Institute of Software Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101704788"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210165038"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.093057,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"3","first_page":"469","last_page":"475"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.8544948101043701},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7760542631149292},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.6702966094017029},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6059654951095581},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6014115810394287},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5094507336616516},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.48963671922683716},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.4566035568714142},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.4375946521759033},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3590155839920044},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.35776668787002563},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.31093543767929077},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1808072030544281},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.0767015814781189}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.8544948101043701},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7760542631149292},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.6702966094017029},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6059654951095581},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6014115810394287},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5094507336616516},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.48963671922683716},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.4566035568714142},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.4375946521759033},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3590155839920044},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.35776668787002563},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31093543767929077},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1808072030544281},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0767015814781189},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11390-007-9047-1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11390-007-9047-1","pdf_url":null,"source":{"id":"https://openalex.org/S161516442","display_name":"Journal of Computer Science and Technology","issn_l":"1000-9000","issn":["1000-9000","1860-4749"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Science and Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1699105","https://openalex.org/W88466764","https://openalex.org/W1520563459","https://openalex.org/W1531794003","https://openalex.org/W1563606623","https://openalex.org/W1568580912","https://openalex.org/W1585665690","https://openalex.org/W1684916776","https://openalex.org/W1881580826","https://openalex.org/W1888861700","https://openalex.org/W2061168187","https://openalex.org/W2104482156","https://openalex.org/W2130845253","https://openalex.org/W2158376794","https://openalex.org/W2161517294","https://openalex.org/W2276497559","https://openalex.org/W4236509984","https://openalex.org/W4285719527","https://openalex.org/W4323540129"],"related_works":["https://openalex.org/W2509111091","https://openalex.org/W4230315357","https://openalex.org/W2951060902","https://openalex.org/W57168481","https://openalex.org/W1990201054","https://openalex.org/W4214545183","https://openalex.org/W2950215720","https://openalex.org/W3029769845","https://openalex.org/W1849484603","https://openalex.org/W4389575897"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
