{"id":"https://openalex.org/W4403210923","doi":"https://doi.org/10.1109/icecet61485.2024.10698687","title":"Cryptanalysis of the SIMON Cypher Using Neo4j","display_name":"Cryptanalysis of the SIMON Cypher Using Neo4j","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4403210923","doi":"https://doi.org/10.1109/icecet61485.2024.10698687"},"language":"en","primary_location":{"id":"doi:10.1109/icecet61485.2024.10698687","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet61485.2024.10698687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Electrical, Computer and Energy Technologies (ICECET","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078214803","display_name":"Jonathan Cook","orcid":"https://orcid.org/0000-0001-8113-1296"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Jonathan Cook","raw_affiliation_strings":["School of Computing, Mathematics and Engineering, Charles Sturt University,Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University,Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041207254","display_name":"Sabih ur Rehman","orcid":"https://orcid.org/0000-0001-7717-2773"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sabih ur Rehman","raw_affiliation_strings":["School of Computing, Mathematics and Engineering, Charles Sturt University,Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University,Australia","institution_ids":["https://openalex.org/I153230381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065309356","display_name":"M. Arif Khan","orcid":"https://orcid.org/0000-0001-6112-8874"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"M. Arif Khan","raw_affiliation_strings":["School of Computing, Mathematics and Engineering, Charles Sturt University,Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Mathematics and Engineering, Charles Sturt University,Australia","institution_ids":["https://openalex.org/I153230381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078214803"],"corresponding_institution_ids":["https://openalex.org/I153230381"],"apc_list":null,"apc_paid":null,"fwci":0.7274,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.76611495,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9513999819755554,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.63381427526474},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5854800939559937},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3379569947719574},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18343904614448547},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1554325819015503}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.63381427526474},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5854800939559937},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3379569947719574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18343904614448547},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1554325819015503}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecet61485.2024.10698687","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet61485.2024.10698687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Electrical, Computer and Energy Technologies (ICECET","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2087928947","https://openalex.org/W2090142081","https://openalex.org/W2096016260","https://openalex.org/W2100197298","https://openalex.org/W2103641030","https://openalex.org/W2112379301","https://openalex.org/W2132022337","https://openalex.org/W2790360011","https://openalex.org/W2913535829","https://openalex.org/W2966349618","https://openalex.org/W2968774960","https://openalex.org/W3004035003","https://openalex.org/W3121066428","https://openalex.org/W4229954652","https://openalex.org/W4313647184","https://openalex.org/W4362579589","https://openalex.org/W4366331238","https://openalex.org/W6731801563","https://openalex.org/W6778727884","https://openalex.org/W6864696404"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"The":[0],"exponential":[1],"growth":[2],"in":[3,82,152],"the":[4,14,28,83,97,102,106,112,129,135,140,153,158,164,168,171],"number":[5],"of":[6,8,16,33,55,77,85,105,114,131,143,160,170,175],"Internet":[7],"Things":[9],"(IoT)":[10],"devices":[11],"has":[12],"seen":[13],"introduction":[15],"several":[17],"Lightweight":[18],"Encryption":[19],"Algorithms":[20],"(LEA).":[21],"While":[22],"LEAs":[23,48,67],"are":[24,49],"designed":[25],"to":[26,44,72,119,128,146],"enhance":[27],"integrity,":[29],"privacy":[30],"and":[31,36,51,62,75,90,166],"security":[32,173],"data":[34],"collected":[35],"transmitted":[37],"by":[38],"IoT":[39],"devices,":[40],"it":[41],"is":[42],"hazardous":[43],"assume":[45],"that":[46],"all":[47],"secure":[50],"exhibit":[52],"similar":[53],"levels":[54],"protection.":[56],"To":[57],"improve":[58],"encryption":[59],"strength,":[60],"cryptanalysts":[61],"algorithm":[63],"designers":[64],"routinely":[65],"probe":[66],"using":[68],"various":[69],"cryptanalysis":[70,86],"techniques":[71],"identify":[73,120,147],"vulnerabilities":[74],"limitations":[76],"LEAs.":[78],"Despite":[79],"recent":[80],"improvements":[81],"efficiency":[84],"utilising":[87,124],"heuristic":[88,107],"methods":[89],"a":[91,115],"Partial":[92],"Difference":[93],"Distribution":[94],"Table":[95],"(PDDT),":[96],"process":[98],"remains":[99],"inefficient,":[100],"with":[101],"random":[103],"nature":[104],"inhibiting":[108],"reproducible":[109],"results.":[110],"However,":[111],"use":[113,142],"PDDT":[116],"presents":[117],"opportunities":[118],"relationships":[121,149],"between":[122,150],"differentials":[123,151],"knowledge":[125,144],"graphs,":[126],"leading":[127],"identification":[130,159],"efficient":[132],"paths":[133,162],"throughout":[134,163],"PDDT.":[136],"This":[137],"paper":[138],"introduces":[139],"novel":[141],"graphs":[145],"intricate":[148],"SIMON":[154],"LEA,":[155],"allowing":[156],"for":[157],"optimal":[161],"differentials,":[165],"increasing":[167],"effectiveness":[169],"differential":[172],"analyses":[174],"SIMON.":[176]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
