{"id":"https://openalex.org/W4393862154","doi":"https://doi.org/10.1080/01611194.2024.2320362","title":"Square impossible differential attack and security of AES in known plaintext scenario","display_name":"Square impossible differential attack and security of AES in known plaintext scenario","publication_year":2024,"publication_date":"2024-04-03","ids":{"openalex":"https://openalex.org/W4393862154","doi":"https://doi.org/10.1080/01611194.2024.2320362"},"language":"en","primary_location":{"id":"doi:10.1080/01611194.2024.2320362","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2024.2320362","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083651729","display_name":"Orhun Kara","orcid":"https://orcid.org/0000-0002-9685-6625"},"institutions":[{"id":"https://openalex.org/I120217413","display_name":"Izmir Institute of Technology","ror":"https://ror.org/03stptj97","country_code":"TR","type":"education","lineage":["https://openalex.org/I120217413"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Orhun Kara","raw_affiliation_strings":["Department of Mathematics, IZTECH, Izmir Institute of Technology","Department of Mathematics, IZTECH, Izmir Institute of Technology, Gulbahce, Urla, Izmir, T\u00dcRK\u0130YE"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, IZTECH, Izmir Institute of Technology","institution_ids":["https://openalex.org/I120217413"]},{"raw_affiliation_string":"Department of Mathematics, IZTECH, Izmir Institute of Technology, Gulbahce, Urla, Izmir, T\u00dcRK\u0130YE","institution_ids":["https://openalex.org/I120217413"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5083651729"],"corresponding_institution_ids":["https://openalex.org/I120217413"],"apc_list":null,"apc_paid":null,"fwci":0.7274,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73327185,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"49","issue":"2","first_page":"128","last_page":"152"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7064420580863953},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6411970853805542},{"id":"https://openalex.org/keywords/square","display_name":"Square (algebra)","score":0.6044187545776367},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5293686389923096},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.48565733432769775},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.4785754978656769},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.35344672203063965},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3386736810207367},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.29902464151382446},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23861879110336304},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1396339237689972}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7064420580863953},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6411970853805542},{"id":"https://openalex.org/C135692309","wikidata":"https://www.wikidata.org/wiki/Q111124","display_name":"Square (algebra)","level":2,"score":0.6044187545776367},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5293686389923096},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.48565733432769775},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.4785754978656769},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.35344672203063965},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3386736810207367},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29902464151382446},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23861879110336304},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1396339237689972},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1080/01611194.2024.2320362","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2024.2320362","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"},{"id":"pmh:oai:gcris.iyte.edu.tr:11147/14361","is_oa":false,"landing_page_url":"https://hdl.handle.net/11147/14361","pdf_url":null,"source":{"id":"https://openalex.org/S4306400894","display_name":"\u0130YTE (\u0130ZM\u0130R Y\u00dcKSEK TEKNOLOJ\u0130 ENST\u0130T\u00dcS\u00dc)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I120217413","host_organization_name":"Izmir Institute of Technology","host_organization_lineage":["https://openalex.org/I120217413"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322626","display_name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","ror":"https://ror.org/04w9kkr77"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W3926427","https://openalex.org/W76721308","https://openalex.org/W972261331","https://openalex.org/W1501856114","https://openalex.org/W1515595447","https://openalex.org/W1541703086","https://openalex.org/W1542020576","https://openalex.org/W1545756401","https://openalex.org/W1565705707","https://openalex.org/W1571067952","https://openalex.org/W1572300106","https://openalex.org/W1584746212","https://openalex.org/W1587120902","https://openalex.org/W1730698658","https://openalex.org/W1848569759","https://openalex.org/W1901931695","https://openalex.org/W1974355178","https://openalex.org/W1986773466","https://openalex.org/W2020251130","https://openalex.org/W2053844828","https://openalex.org/W2066597764","https://openalex.org/W2090921898","https://openalex.org/W2119874003","https://openalex.org/W2140357103","https://openalex.org/W2144007792","https://openalex.org/W2156497336","https://openalex.org/W2423456660","https://openalex.org/W2562653307","https://openalex.org/W2584878234","https://openalex.org/W2585018408","https://openalex.org/W2591966525","https://openalex.org/W2753831817","https://openalex.org/W2794069903","https://openalex.org/W2794557845","https://openalex.org/W2889511553","https://openalex.org/W2916704439","https://openalex.org/W2955859497","https://openalex.org/W2975060468","https://openalex.org/W2999106493","https://openalex.org/W3005990193","https://openalex.org/W4238341678","https://openalex.org/W4398224880"],"related_works":["https://openalex.org/W2385743990","https://openalex.org/W2350176425","https://openalex.org/W1499266877","https://openalex.org/W4245233789","https://openalex.org/W4248712873","https://openalex.org/W2393941228","https://openalex.org/W3106115593","https://openalex.org/W2376611979","https://openalex.org/W2532587261","https://openalex.org/W2925105947"],"abstract_inverted_index":{"In":[0],"this":[1],"work,":[2],"we":[3,66],"examine":[4],"the":[5,8,12,29,52,58,74,82,85,117,122,126,131,137,141,151,154,179],"security":[6],"of":[7,19,84,102,144,147,181],"8-round":[9,59],"AES,":[10],"under":[11],"known":[13,54,72,183],"plaintext":[14,30,55,94,184],"attack":[15,21,42,56,70,98,105,135,185,188],"scenario,":[16],"a":[17,46,62,68,100,103,159],"type":[18],"cryptographic":[20],"in":[22,90],"which":[23,44],"an":[24,37,107],"attacker":[25],"has":[26],"access":[27],"to":[28,50,80,171,191],"and":[31,106,129,133,174,186,194],"corresponding":[32],"ciphertext":[33,92],"pairs.":[34],"We":[35],"present":[36],"innovative":[38],"impossible":[39,155],"differential":[40,156],"(ID)":[41],"technique,":[43],"utilizes":[45],"specific":[47],"ID":[48,86,108],"characteristic,":[49],"perform":[51],"first":[53],"on":[57,88],"AES":[60,89,148],"with":[61],"256-bit":[63],"key.":[64],"Additionally,":[65],"propose":[67],"new":[69,114],"methodology,":[71],"as":[73],"Square":[75],"Impossible":[76],"Differential":[77],"(SID)":[78],"attack,":[79],"enhance":[81],"effectiveness":[83],"attacks":[87],"chosen":[91],"or":[93],"scenarios.":[95],"The":[96],"SID":[97,187],"is":[99],"combination":[101],"square":[104],"attack.":[109],"Our":[110,164],"methodology":[111],"introduces":[112],"various":[113],"approaches,":[115],"including":[116],"key":[118,123],"indicator":[119],"vectors,":[120],"eliminating":[121],"candidate":[124],"through":[125,136],"Meet-in-The-Middle":[127],"technique":[128],"mounting":[130],"guess":[132],"determine":[134],"hash":[138],"tables":[139],"for":[140,158],"two-round":[142],"decryption":[143],"one":[145],"column":[146],"while":[149],"determining":[150],"subkeys":[152],"constituting":[153],"characteristic":[157],"given":[160],"plaintext/ciphertext":[161],"difference":[162],"pair.":[163],"approach":[165],"demonstrates":[166],"lower":[167],"computational":[168],"complexity":[169],"compared":[170],"previous":[172],"methods,":[173],"our":[175,182],"analysis":[176],"shows":[177],"that":[178],"complexities":[180],"are":[189],"estimated":[190],"be":[192],"2220":[193],"2209,":[195],"respectively.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
