{"id":"https://openalex.org/W7123348741","doi":"https://doi.org/10.1109/candarw68385.2025.00055","title":"Integral Characteristics of Piccolo derived by Bit-based Division Property","display_name":"Integral Characteristics of Piccolo derived by Bit-based Division Property","publication_year":2025,"publication_date":"2025-11-25","ids":{"openalex":"https://openalex.org/W7123348741","doi":"https://doi.org/10.1109/candarw68385.2025.00055"},"language":null,"primary_location":{"id":"doi:10.1109/candarw68385.2025.00055","is_oa":false,"landing_page_url":"https://doi.org/10.1109/candarw68385.2025.00055","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Thirteenth International Symposium on Computing and Networking Workshops (CANDARW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042157768","display_name":"Naoki Shibayama","orcid":null},"institutions":[{"id":"https://openalex.org/I161296585","display_name":"Tokyo University of Science","ror":"https://ror.org/05sj3n476","country_code":"JP","type":"education","lineage":["https://openalex.org/I161296585"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Naoki Shibayama","raw_affiliation_strings":["Tokyo University of Science 2641 Yamazaki,Noda,Chiba,Japan,278-8510"],"affiliations":[{"raw_affiliation_string":"Tokyo University of Science 2641 Yamazaki,Noda,Chiba,Japan,278-8510","institution_ids":["https://openalex.org/I161296585"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yasutaka Igarashi","orcid":null},"institutions":[{"id":"https://openalex.org/I161296585","display_name":"Tokyo University of Science","ror":"https://ror.org/05sj3n476","country_code":"JP","type":"education","lineage":["https://openalex.org/I161296585"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasutaka Igarashi","raw_affiliation_strings":["Tokyo University of Science 2641 Yamazaki,Noda,Chiba,Japan,278-8510"],"affiliations":[{"raw_affiliation_string":"Tokyo University of Science 2641 Yamazaki,Noda,Chiba,Japan,278-8510","institution_ids":["https://openalex.org/I161296585"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5042157768"],"corresponding_institution_ids":["https://openalex.org/I161296585"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.83821481,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"287","last_page":"293"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.8751000165939331,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.8751000165939331,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.09849999845027924,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.006899999920278788,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.704200029373169},{"id":"https://openalex.org/keywords/division","display_name":"Division (mathematics)","score":0.6528000235557556},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.6284999847412109},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5702000260353088},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.5673999786376953},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.35010001063346863}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.704200029373169},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.7038999795913696},{"id":"https://openalex.org/C60798267","wikidata":"https://www.wikidata.org/wiki/Q1226939","display_name":"Division (mathematics)","level":2,"score":0.6528000235557556},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.6284999847412109},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5702000260353088},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.5673999786376953},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.35010001063346863},{"id":"https://openalex.org/C97137487","wikidata":"https://www.wikidata.org/wiki/Q729138","display_name":"Integer (computer science)","level":2,"score":0.33079999685287476},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.29910001158714294},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.28380000591278076},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.28189998865127563},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.2818000018596649},{"id":"https://openalex.org/C168773769","wikidata":"https://www.wikidata.org/wiki/Q1350299","display_name":"Satisfiability","level":2,"score":0.2800999879837036},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26019999384880066}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/candarw68385.2025.00055","is_oa":false,"landing_page_url":"https://doi.org/10.1109/candarw68385.2025.00055","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Thirteenth International Symposium on Computing and Networking Workshops (CANDARW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Piccolo":[0,13,31],"is":[1,64,168],"a":[2,65,69,116,120,125,180],"64-bit":[3],"block":[4],"cipher":[5],"proposed":[6,79],"by":[7,43,101,146],"Shibutani":[8],"et":[9],"al.":[10],"in":[11],"2011.":[12],"supports":[14],"80":[15],"and":[16,74,124],"128-bit":[17],"secret":[18],"keys.":[19],"On":[20],"its":[21],"higher":[22,70],"order":[23,41,59,71,122,139,174,189],"differential":[24,42,72,175,190],"attack,":[25,73],"it":[26],"has":[27,32],"been":[28,78],"reported":[29],"that":[30,162],"the":[33,38,51,56,103,108,113,128,131,136,147,155,163,171,186],"6":[34],"-round":[35,53,165,183],"characteristic":[36,54,118,134,167,184],"using":[37,55,86,119,135,185],"32":[39,192],"-nd":[40],"computer":[44],"experiment,":[45],"which":[46],"was":[47],"theoretically":[48],"extended":[49],"to":[50,68,80,151],"7":[52,164,182],"48":[57],"-th":[58,188],"differential.":[60,140],"The":[61],"integral":[62,84,99,144,166],"attack":[63],"cryptanalysis":[66,145],"similar":[67],"efficient":[75],"methods":[76],"have":[77],"search":[81,126],"for":[82],"better":[83],"characteristics":[85,100],"Mixed":[87],"Integer":[88],"Linear":[89],"Programming":[90],"(MILP)":[91],"or":[92],"Satisfiability":[93],"Problem":[94],"(SAT).":[95],"An":[96],"investigation":[97],"of":[98,115],"establishing":[102,154],"MILP":[104,158],"model":[105],"based":[106],"on":[107],"bit-based":[109,148],"division":[110,149],"property":[111,150],"revealed":[112],"existence":[114],"7-round":[117],"63-rd":[121],"differential,":[123],"with":[127,170,191],"SAT":[129],"found":[130,161,179],"same":[132],"round":[133],"$\\mathbf{5":[137],"6}$-th":[138],"This":[141],"paper":[142],"applies":[143],"Piccolo.":[152],"By":[153],"more":[156],"accurate":[157],"model,":[159],"we":[160,178],"consistent":[169],"existing":[172],"48-th":[173],"characteristic.":[176],"Then,":[177],"new":[181],"60":[187],"balanced":[193],"bits.":[194]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-01-14T00:00:00"}
