{"id":"https://openalex.org/W4389722858","doi":"https://doi.org/10.1049/2023/7171600","title":"Similarity Property and Slide Attack of Block Cipher FESH","display_name":"Similarity Property and Slide Attack of Block Cipher FESH","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4389722858","doi":"https://doi.org/10.1049/2023/7171600"},"language":"en","primary_location":{"id":"doi:10.1049/2023/7171600","is_oa":true,"landing_page_url":"https://doi.org/10.1049/2023/7171600","pdf_url":"https://downloads.hindawi.com/journals/ietis/2023/7171600.pdf","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/ietis/2023/7171600.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113381043","display_name":"Yafei Zheng","orcid":"https://orcid.org/0000-0001-7550-0251"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yafei Zheng","raw_affiliation_strings":["University of Chinese Academy of Sciences, Beijing 100049, China","Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing 100190, China","State Key Laboratory of Cryptology, Beijing 100878, China"],"raw_orcid":"https://orcid.org/0000-0001-7550-0251","affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing 100878, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing 100190, China","University of Chinese Academy of Sciences, Beijing 100049, China"],"raw_orcid":"https://orcid.org/0000-0001-6244-3489","affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113381043"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210132990","https://openalex.org/I4210165038"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":{"value":2000,"currency":"EUR","value_usd":2200},"fwci":0.1685,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5907106,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"2023","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6474173069000244},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.6469284296035767},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5834619998931885},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5491712689399719},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5347812175750732},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5329936742782593},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5095148682594299},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.48927804827690125},{"id":"https://openalex.org/keywords/iterated-function","display_name":"Iterated function","score":0.4569679796695709},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4361780285835266},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.41435906291007996},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34255993366241455},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.33810955286026},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1936853528022766},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17525392770767212},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.08579987287521362},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.08062541484832764}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6474173069000244},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.6469284296035767},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5834619998931885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5491712689399719},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5347812175750732},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5329936742782593},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5095148682594299},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.48927804827690125},{"id":"https://openalex.org/C140479938","wikidata":"https://www.wikidata.org/wiki/Q5254619","display_name":"Iterated function","level":2,"score":0.4569679796695709},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4361780285835266},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.41435906291007996},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34255993366241455},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33810955286026},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1936853528022766},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17525392770767212},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.08579987287521362},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.08062541484832764},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1049/2023/7171600","is_oa":true,"landing_page_url":"https://doi.org/10.1049/2023/7171600","pdf_url":"https://downloads.hindawi.com/journals/ietis/2023/7171600.pdf","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:cfcefa6c30fe4eccb98a5d11c64647ac","is_oa":true,"landing_page_url":"https://doaj.org/article/cfcefa6c30fe4eccb98a5d11c64647ac","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IET Information Security, Vol 2023 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1049/2023/7171600","is_oa":true,"landing_page_url":"https://doi.org/10.1049/2023/7171600","pdf_url":"https://downloads.hindawi.com/journals/ietis/2023/7171600.pdf","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7838409408","display_name":null,"funder_award_id":"62072445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4389722858.pdf","grobid_xml":"https://content.openalex.org/works/W4389722858.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W134330662","https://openalex.org/W1490559148","https://openalex.org/W1555491615","https://openalex.org/W1608254955","https://openalex.org/W1748947802","https://openalex.org/W2031508620","https://openalex.org/W2163466490","https://openalex.org/W2610935322","https://openalex.org/W2913212653","https://openalex.org/W2942732753"],"related_works":["https://openalex.org/W3103325625","https://openalex.org/W1486898455","https://openalex.org/W3090727460","https://openalex.org/W2041905724","https://openalex.org/W2047986527","https://openalex.org/W4306313719","https://openalex.org/W2100090372","https://openalex.org/W3128682647","https://openalex.org/W4361205702","https://openalex.org/W2991463004"],"abstract_inverted_index":{"This":[0],"paper":[1],"focuses":[2],"on":[3,60,133],"similarity":[4,33,62,80],"properties":[5,34,66,81,137],"and":[6,38,51,55,82,123],"extension":[7],"of":[8,13,22,35,74,91,104,115,129,142,149],"the":[9,23,36,45,49,56,61,89,101,112,116,134],"classical":[10],"slide":[11,65,84,108,119,130,136],"property":[12,85,109],"block":[14,20],"ciphers.":[15],"Taking":[16,121],"FESH,":[17],"an":[18,31],"award\u2010winning":[19],"cipher":[21],"National":[24],"Cryptographic":[25],"Algorithm":[26],"Design":[27],"Competition":[28],"2019,":[29],"as":[30,126],"example,":[32],"encryption":[37,50],"key":[39,52],"transformation":[40,53],"are":[41,76,86,138],"found,":[42],"owing":[43],"to":[44,88],"similar":[46],"structures":[47,125],"that":[48],"adopted,":[54],"constants":[57],"generation.":[58],"Based":[59],"properties,":[63],"extended":[64,83,107,135],"can":[67],"be":[68,97],"constructed":[69],"for":[70],"FESH.":[71,105],"Slide":[72,140],"attacks":[73,131],"FESH":[75,143],"then":[77],"proposed.":[78],"The":[79],"immune":[87],"increasing":[90,100],"iterated":[92],"rounds,":[93],"i.e.,":[94],"it":[95],"cannot":[96],"avoided":[98],"by":[99],"round":[102],"number":[103],"Furthermore,":[106],"helps":[110],"relaxing":[111],"strict":[113],"requirements":[114],"subkeys":[117],"in":[118],"attacks.":[120],"Feistel":[122],"SPN":[124,150],"examples,":[127],"frameworks":[128],"based":[132],"presented.":[139],"attack":[141],"is":[144],"exactly":[145],"a":[146],"concrete":[147],"example":[148],"structure.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
