{"id":"https://openalex.org/W2809425259","doi":"https://doi.org/10.1093/comjnl/bxy061","title":"Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128","display_name":"Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128","publication_year":2018,"publication_date":"2018-05-23","ids":{"openalex":"https://openalex.org/W2809425259","doi":"https://doi.org/10.1093/comjnl/bxy061","mag":"2809425259"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxy061","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy061","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100618728","display_name":"Ya Liu","orcid":"https://orcid.org/0000-0001-5175-2657"},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ya Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","Engineering Research Center of Optical Instrument and System, Ministry of Education, Shanghai Key Lab of Modern Optical System, University of Shanghai for Science and Technology, Shanghai, China","State Key Laboratory of Cryptology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-5175-2657","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Engineering Research Center of Optical Instrument and System, Ministry of Education, Shanghai Key Lab of Modern Optical System, University of Shanghai for Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I148128674"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061077174","display_name":"Anren Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anren Yang","raw_affiliation_strings":["Engineering Research Center of Optical Instrument and System, Ministry of Education, Shanghai Key Lab of Modern Optical System, University of Shanghai for Science and Technology, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Optical Instrument and System, Ministry of Education, Shanghai Key Lab of Modern Optical System, University of Shanghai for Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079863650","display_name":"Bo Dai","orcid":"https://orcid.org/0000-0003-4992-9972"},"institutions":[{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Dai","raw_affiliation_strings":["Engineering Research Center of Optical Instrument and System, Ministry of Education, Shanghai Key Lab of Modern Optical System, University of Shanghai for Science and Technology, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Engineering Research Center of Optical Instrument and System, Ministry of Education, Shanghai Key Lab of Modern Optical System, University of Shanghai for Science and Technology, Shanghai, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101997634","display_name":"Wei Li","orcid":"https://orcid.org/0000-0003-0887-3116"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]},{"id":"https://openalex.org/I4210151021","display_name":"Shanghai Institute of Computing Technology","ror":"https://ror.org/05ek0ze18","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210151021"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Li","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University, Shanghai, China","Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, Shanghai, China","Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, Shanghai, China","institution_ids":[]},{"raw_affiliation_string":"Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai, China","institution_ids":["https://openalex.org/I4210151021"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100415090","display_name":"Zhiqiang Liu","orcid":"https://orcid.org/0000-0002-0846-4825"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008204306","display_name":"Dawu Gu","orcid":"https://orcid.org/0000-0002-0504-9538"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawu Gu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015515281","display_name":"Zhiqiang Zeng","orcid":"https://orcid.org/0000-0002-6615-9626"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiqiang Zeng","raw_affiliation_strings":["Science and Technology on Information Assurance Laboratory, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Science and Technology on Information Assurance Laboratory, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100618728"],"corresponding_institution_ids":["https://openalex.org/I148128674","https://openalex.org/I183067930","https://openalex.org/I4210132990"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.1694,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.59251821,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"61","issue":"8","first_page":"1252","last_page":"1258"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8495177626609802},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7613515853881836},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5477803945541382},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.519742488861084},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.4638040065765381},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4556191563606262},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4533289670944214},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3403809070587158},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.2556998133659363},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10743197798728943}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8495177626609802},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7613515853881836},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5477803945541382},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.519742488861084},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.4638040065765381},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4556191563606262},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4533289670944214},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3403809070587158},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.2556998133659363},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10743197798728943},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxy061","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy061","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1362102058","display_name":null,"funder_award_id":"61472250","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2265083633","display_name":null,"funder_award_id":"15ZR1400300","funder_id":"https://openalex.org/F4320327655","funder_display_name":"Foundation of Science and Technology on Information Assurance Laboratory"},{"id":"https://openalex.org/G3129082882","display_name":null,"funder_award_id":"61672347","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4840445194","display_name":null,"funder_award_id":"16ZR1401100","funder_id":"https://openalex.org/F4320327655","funder_display_name":"Foundation of Science and Technology on Information Assurance Laboratory"},{"id":"https://openalex.org/G5836928694","display_name":null,"funder_award_id":"61601292","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7689699621","display_name":null,"funder_award_id":"15ZR1400300","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"},{"id":"https://openalex.org/G7976880439","display_name":null,"funder_award_id":"16ZR1401100","funder_id":"https://openalex.org/F4320309612","funder_display_name":"Natural Science Foundation of Shanghai"}],"funders":[{"id":"https://openalex.org/F4320309612","display_name":"Natural Science Foundation of Shanghai","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327655","display_name":"Foundation of Science and Technology on Information Assurance Laboratory","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1408712796","https://openalex.org/W2395600724","https://openalex.org/W2585880228","https://openalex.org/W2771007556","https://openalex.org/W4252824418","https://openalex.org/W6733642689"],"related_works":["https://openalex.org/W2964609758","https://openalex.org/W2910464690","https://openalex.org/W2807501579","https://openalex.org/W3011345142","https://openalex.org/W2134038088","https://openalex.org/W2156908834","https://openalex.org/W1920865994","https://openalex.org/W2585018408","https://openalex.org/W1565705707","https://openalex.org/W3089223619"],"abstract_inverted_index":{"TWINE":[0],"is":[1,15],"a":[2,17,33,55,73,84],"lightweight":[3,24],"block":[4],"cipher,":[5],"which":[6],"was":[7],"proposed":[8],"by":[9,61],"NEC":[10],"corporation":[11],"in":[12,23,47,118],"2012.":[13],"It":[14],"both":[16],"good":[18],"example":[19],"of":[20,28,32,45,66,77,127],"common":[21],"trade-offs":[22],"cryptography":[25],"and":[26,93,103],"one":[27],"the":[29,63,119],"only":[30],"instances":[31],"GFN":[34],"with":[35],"improved":[36],"diffusion":[37,65],"layer.":[38],"Therefore,":[39],"its":[40],"security":[41],"has":[42],"attracted":[43],"amount":[44],"attention":[46],"recent":[48],"years.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53,70,82],"present":[54],"meet-in-the-middle":[56,85],"attack":[57,86],"on":[58,80,87,116],"26-round":[59,88,101],"TWINE-128":[60,117],"exploiting":[62],"slow":[64],"key":[67],"schedule.":[68],"Specifically,":[69],"first":[71],"construct":[72],"new":[74],"11-round":[75],"distinguisher":[76],"TWINE.":[78],"Based":[79],"it,":[81],"mount":[83],"TWINE-128.":[89,128],"The":[90],"data,":[91],"time":[92],"memory":[94],"complexities":[95],"are":[96,110],"260":[97],"chosen":[98],"plaintexts,":[99],"2126.18":[100],"encryptions":[102],"2109":[104],"64-bit":[105],"blocks,":[106],"respectively.":[107],"Our":[108],"results":[109],"better":[111],"than":[112],"all":[113],"previous":[114],"ones":[115],"single-key":[120],"scenario":[121],"if":[122],"not":[123],"considering":[124],"biclique":[125],"cryptanalysis":[126]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
