{"id":"https://openalex.org/W4296482681","doi":"https://doi.org/10.1093/comjnl/bxac116","title":"Cryptanalysis on Reduced-Round 3D and Saturnin","display_name":"Cryptanalysis on Reduced-Round 3D and Saturnin","publication_year":2022,"publication_date":"2022-09-16","ids":{"openalex":"https://openalex.org/W4296482681","doi":"https://doi.org/10.1093/comjnl/bxac116"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxac116","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxac116","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100425751","display_name":"Li Zhang","orcid":"https://orcid.org/0000-0003-3159-8415"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Zhang","raw_affiliation_strings":["State Key Laboratory of Cryptology , Beijing 100878, China","Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190, China","University of Chinese Academy of Sciences , Beijing 100049, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology , Beijing 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences , Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190, China","University of Chinese Academy of Sciences , Beijing 100049, China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences , Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113381043","display_name":"Yafei Zheng","orcid":"https://orcid.org/0000-0001-7550-0251"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"YaFei Zheng","raw_affiliation_strings":["State Key Laboratory of Cryptology , Beijing 100878, China","Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190, China","University of Chinese Academy of Sciences , Beijing 100049, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology , Beijing 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences , Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106716567","display_name":"Bolin Wang","orcid":"https://orcid.org/0000-0002-6689-7936"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bolin Wang","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190, China","University of Chinese Academy of Sciences , Beijing 100049, China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences , Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5113381043"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210132990","https://openalex.org/I4210165038"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09489642,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"66","issue":"4","first_page":"1017","last_page":"1029"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7865629196166992},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7506558895111084},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.6756358742713928},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6590946912765503},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6544800996780396},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.5864638686180115},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.4734451472759247},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.47248950600624084},{"id":"https://openalex.org/keywords/equivalence","display_name":"Equivalence (formal languages)","score":0.45539939403533936},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4535166323184967},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43278664350509644},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4186869263648987},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4173584580421448},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.29630139470100403},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27259206771850586},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20182904601097107},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.15083152055740356}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7865629196166992},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7506558895111084},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.6756358742713928},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6590946912765503},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6544800996780396},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.5864638686180115},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.4734451472759247},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47248950600624084},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.45539939403533936},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4535166323184967},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43278664350509644},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4186869263648987},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4173584580421448},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.29630139470100403},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27259206771850586},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20182904601097107},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.15083152055740356}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxac116","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxac116","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G7838409408","display_name":null,"funder_award_id":"62072445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1494122421","https://openalex.org/W2319837761","https://openalex.org/W2560846039","https://openalex.org/W2585018408","https://openalex.org/W2591966525","https://openalex.org/W2600371925","https://openalex.org/W2607638782","https://openalex.org/W2769426629","https://openalex.org/W2891687671","https://openalex.org/W2912250127","https://openalex.org/W2954468923","https://openalex.org/W2972502650","https://openalex.org/W2979226406","https://openalex.org/W2990731611","https://openalex.org/W3029679304","https://openalex.org/W3081737099","https://openalex.org/W3157695497","https://openalex.org/W3213156024","https://openalex.org/W6768721335","https://openalex.org/W6794259111","https://openalex.org/W6803805832"],"related_works":["https://openalex.org/W2996824228","https://openalex.org/W4230315357","https://openalex.org/W2557174342","https://openalex.org/W57168481","https://openalex.org/W2560473362","https://openalex.org/W1598870173","https://openalex.org/W2593607592","https://openalex.org/W1410349837","https://openalex.org/W1507705751","https://openalex.org/W1601440354"],"abstract_inverted_index":{"Abstract":[0],"3D":[1,10,19,65,123],"is":[2,20,95,150,173],"an":[3],"Advanced":[4],"Encryption":[5],"Standard":[6],"(AES)-like":[7],"cipher":[8,41],"employed":[9],"structure":[11,66],"proposed":[12,79],"in":[13,49,153,186,199],"2008.":[14],"The":[15,76,145],"main":[16],"innovation":[17],"of":[18,27,53,87,100,110,112,147,155,190,201],"the":[21,25,34,50,98,119,136,148,165,176,181,187,192,197,202,205],"multi-dimensional":[22],"state,":[23],"generalizing":[24],"design":[26,188],"Rijndael":[28],"and":[29,55,67,73,82,124,158],"allowing":[30],"block":[31,40],"sizes":[32],"beyond":[33],"256-bit":[35],"boundary.":[36],"Saturnin,":[37,162,191],"a":[38,46,64,107],"lightweight":[39,59],"has":[42],"been":[43],"selected":[44],"as":[45],"second-round":[47],"candidate":[48],"National":[51],"Institute":[52],"Standards":[54],"Technology":[56],"standardization":[57],"for":[58,92,142,175],"cryptography.":[60],"It":[61,94],"also":[62],"employs":[63],"provides":[68],"high":[69],"security":[70],"against":[71],"quantum":[72],"classic":[74],"attacks.":[75],"exchange-equivalence":[77,120],"attacks":[78,185,193],"by":[80],"Bardeh":[81],"R\u00f8njom":[83],"consider":[84],"how":[85],"quadruples":[86],"plaintexts":[88],"confirm":[89],"distinguishable":[90],"properties":[91],"AES.":[93],"similar":[96],"to":[97,134],"principle":[99],"yoyo":[101,125,170],"attack,":[102,171],"but":[103],"it":[104],"can":[105],"find":[106],"longer":[108],"number":[109],"rounds":[111],"distinguisher.":[113],"In":[114],"this":[115],"paper,":[116],"we":[117,163],"investigate":[118],"attack":[121,126],"on":[122,127],"Saturnin.":[128],"Our":[129],"new":[130],"results":[131],"turn":[132],"out":[133],"be":[135],"first":[137,166],"secret-key":[138],"chosen":[139],"plaintext":[140],"distinguisher":[141,149],"10-round":[143],"3D.":[144],"complexity":[146,203],"about":[151],"$2^{364.2}$":[152],"terms":[154,200],"data,":[156],"memory":[157],"computational":[159],"complexity.":[160],"For":[161],"propose":[164],"six-super-round":[167],"impossible":[168,183],"differential":[169,184],"which":[172],"suitable":[174],"two-S-layer":[177],"version.":[178],"Compared":[179],"with":[180],"previous":[182],"report":[189],"presented":[194],"here":[195],"are":[196],"best":[198],"under":[204],"chosen-plaintext":[206],"scenario.":[207]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
