{"id":"https://openalex.org/W2158296297","doi":"https://doi.org/10.1093/comjnl/bxp054","title":"Side-Channel Attack Using Meet-in-the-Middle Technique","display_name":"Side-Channel Attack Using Meet-in-the-Middle Technique","publication_year":2009,"publication_date":"2009-06-10","ids":{"openalex":"https://openalex.org/W2158296297","doi":"https://doi.org/10.1093/comjnl/bxp054","mag":"2158296297"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxp054","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxp054","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100698865","display_name":"Junseok Kim","orcid":"https://orcid.org/0000-0002-0484-9189"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"J. Kim","raw_affiliation_strings":["Center for Information Security Technologies (CIST), Korea University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies (CIST), Korea University, Seoul, Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020941453","display_name":"S. J. Hong","orcid":"https://orcid.org/0000-0003-1252-5421"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"S. Hong","raw_affiliation_strings":["Center for Information Security Technologies (CIST), Korea University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Center for Information Security Technologies (CIST), Korea University, Seoul, Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020941453"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.4362,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74706719,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"53","issue":"7","first_page":"934","last_page":"938"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.863168478012085},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8528379797935486},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.7452262043952942},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7096837162971497},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.667479395866394},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6097989678382874},{"id":"https://openalex.org/keywords/slide-attack","display_name":"Slide attack","score":0.5702527761459351},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5149820446968079},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5001266002655029},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4408164322376251},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4385181963443756},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.42894482612609863},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.37826842069625854},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34334346652030945},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3408247232437134},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3143651783466339}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.863168478012085},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8528379797935486},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.7452262043952942},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7096837162971497},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.667479395866394},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6097989678382874},{"id":"https://openalex.org/C89694405","wikidata":"https://www.wikidata.org/wiki/Q7540343","display_name":"Slide attack","level":5,"score":0.5702527761459351},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5149820446968079},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5001266002655029},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4408164322376251},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4385181963443756},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.42894482612609863},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.37826842069625854},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34334346652030945},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3408247232437134},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3143651783466339}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxp054","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxp054","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2151136913","https://openalex.org/W2168020973","https://openalex.org/W141793162","https://openalex.org/W1565705707","https://openalex.org/W2371766190","https://openalex.org/W3107970262","https://openalex.org/W1597699498","https://openalex.org/W2056597178","https://openalex.org/W2616429881","https://openalex.org/W4324139508"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,22],"introduce":[4],"a":[5,14],"new":[6,19],"side-channel":[7,20,84],"attack":[8,85],"using":[9],"block":[10],"cipher":[11],"cryptanalysis":[12],"named":[13],"meet-in-the-middle":[15],"attack.":[16,44],"Using":[17],"our":[18,63],"technique":[21],"show":[23],"that":[24,47],"advanced":[25],"encryption":[26],"standard":[27],"(AES)":[28],"with":[29,74,89],"reduced":[30,75,90],"10":[31,76],"masked":[32,77,92],"rounds":[33,54],"is":[34,37,67,86],"broken,":[35],"which":[36],"faster":[38],"than":[39],"the":[40,52,56,68,80],"exhaustive":[41],"key":[42,59],"search":[43],"This":[45],"implies":[46],"one":[48,70],"has":[49],"to":[50,61,71],"mask":[51],"entire":[53],"of":[55],"12-round":[57],"192-bit":[58],"AES":[60,73,88],"prevent":[62],"attacks.":[64],"Our":[65],"result":[66],"first":[69],"analyse":[72],"rounds,":[78],"while":[79],"previous":[81],"best":[82],"known":[83],"on":[87],"eight":[91],"rounds.":[93]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
