{"id":"https://openalex.org/W2783456708","doi":"https://doi.org/10.1109/icsai.2017.8248428","title":"General attacks on compression functions based on key alternating ciphers","display_name":"General attacks on compression functions based on key alternating ciphers","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2783456708","doi":"https://doi.org/10.1109/icsai.2017.8248428","mag":"2783456708"},"language":"en","primary_location":{"id":"doi:10.1109/icsai.2017.8248428","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsai.2017.8248428","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 4th International Conference on Systems and Informatics (ICSAI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061143852","display_name":"Yiyuan Luo","orcid":"https://orcid.org/0000-0002-9557-5100"},"institutions":[{"id":"https://openalex.org/I4210156189","display_name":"Shanghai Dianji University","ror":"https://ror.org/055fene14","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210156189"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiyuan Luo","raw_affiliation_strings":["School of Electronic and Information, Shanghai Dian Ji University, Shanghai"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information, Shanghai Dian Ji University, Shanghai","institution_ids":["https://openalex.org/I4210156189"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5061143852"],"corresponding_institution_ids":["https://openalex.org/I4210156189"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19398859,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"lncs 773","issue":null,"first_page":"980","last_page":"984"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7159262299537659},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6780340671539307},{"id":"https://openalex.org/keywords/cbc-mac","display_name":"CBC-MAC","score":0.6195919513702393},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.5527721643447876},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5333540439605713},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4767140746116638},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46697020530700684},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.43795377016067505},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3631063997745514},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.30467188358306885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27330708503723145},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11024478077888489},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.0814848244190216}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7159262299537659},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6780340671539307},{"id":"https://openalex.org/C156529985","wikidata":"https://www.wikidata.org/wiki/Q2736227","display_name":"CBC-MAC","level":4,"score":0.6195919513702393},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.5527721643447876},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5333540439605713},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4767140746116638},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46697020530700684},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.43795377016067505},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3631063997745514},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30467188358306885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27330708503723145},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11024478077888489},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.0814848244190216},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsai.2017.8248428","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsai.2017.8248428","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 4th International Conference on Systems and Informatics (ICSAI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":90,"referenced_works":["https://openalex.org/W50116563","https://openalex.org/W88692657","https://openalex.org/W89245623","https://openalex.org/W103427359","https://openalex.org/W114757832","https://openalex.org/W200599792","https://openalex.org/W213085963","https://openalex.org/W813596860","https://openalex.org/W1480951587","https://openalex.org/W1492619099","https://openalex.org/W1508362310","https://openalex.org/W1522447864","https://openalex.org/W1524660258","https://openalex.org/W1525090271","https://openalex.org/W1526778951","https://openalex.org/W1529672696","https://openalex.org/W1531932745","https://openalex.org/W1544857718","https://openalex.org/W1549228503","https://openalex.org/W1553650484","https://openalex.org/W1556212265","https://openalex.org/W1579585272","https://openalex.org/W1580541130","https://openalex.org/W1581775602","https://openalex.org/W1583972302","https://openalex.org/W1587127684","https://openalex.org/W1598083797","https://openalex.org/W1600432225","https://openalex.org/W1656731780","https://openalex.org/W1727535721","https://openalex.org/W1744216657","https://openalex.org/W1769160577","https://openalex.org/W1793463258","https://openalex.org/W1851910379","https://openalex.org/W1863270349","https://openalex.org/W1884480624","https://openalex.org/W1982391252","https://openalex.org/W1997331713","https://openalex.org/W2005903962","https://openalex.org/W2035150628","https://openalex.org/W2045305748","https://openalex.org/W2064939672","https://openalex.org/W2069729829","https://openalex.org/W2075996842","https://openalex.org/W2080956839","https://openalex.org/W2082531775","https://openalex.org/W2089992327","https://openalex.org/W2097239580","https://openalex.org/W2103239853","https://openalex.org/W2109265351","https://openalex.org/W2112236948","https://openalex.org/W2130566903","https://openalex.org/W2130574782","https://openalex.org/W2131642892","https://openalex.org/W2134553300","https://openalex.org/W2145006563","https://openalex.org/W2148959297","https://openalex.org/W2156912159","https://openalex.org/W2159864663","https://openalex.org/W2159884837","https://openalex.org/W2168130511","https://openalex.org/W2179372123","https://openalex.org/W2182055373","https://openalex.org/W2208284559","https://openalex.org/W2211143975","https://openalex.org/W2240009439","https://openalex.org/W2282322275","https://openalex.org/W2294631369","https://openalex.org/W2326587081","https://openalex.org/W2335158110","https://openalex.org/W2367359256","https://openalex.org/W2398602458","https://openalex.org/W2403603568","https://openalex.org/W2552378946","https://openalex.org/W2594725628","https://openalex.org/W2610943770","https://openalex.org/W2612691132","https://openalex.org/W2916086000","https://openalex.org/W2949439226","https://openalex.org/W3145042860","https://openalex.org/W3202552725","https://openalex.org/W4285719527","https://openalex.org/W6604171925","https://openalex.org/W6608218161","https://openalex.org/W6628933401","https://openalex.org/W6632792175","https://openalex.org/W6633156190","https://openalex.org/W6635915873","https://openalex.org/W6667966967","https://openalex.org/W7033679585"],"related_works":["https://openalex.org/W1638546798","https://openalex.org/W2496164548","https://openalex.org/W2344782235","https://openalex.org/W4390979909","https://openalex.org/W1517717760","https://openalex.org/W2413819851","https://openalex.org/W26151103","https://openalex.org/W2594752225","https://openalex.org/W1985725551","https://openalex.org/W2896396044"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3,16,54],"consider":[4],"the":[5,19,47,77,90,97,101,106,122],"security":[6],"of":[7,96,132],"compression":[8,21,31,66,85],"functions":[9,32,67],"based":[10],"on":[11,18,62,84],"key":[12,70],"alternating":[13,71],"ciphers.":[14],"Specifically,":[15],"focus":[17],"PGV":[20,30,65],"functions.":[22],"It":[23],"is":[24,51,73],"known":[25],"that":[26],"there":[27],"are":[28],"12":[29,64],"which":[33],"can":[34],"be":[35,38],"proved":[36],"to":[37],"both":[39],"optimum":[40],"collision":[41,58,80],"resistance":[42,45],"and":[43,59,81,125],"preimage":[44,82],"when":[46,68],"underlying":[48],"block":[49,103,109],"cipher":[50,72,110],"ideal.":[52],"However,":[53],"present":[55],"new":[56],"general":[57],"preimages":[60],"attacks":[61,88,114,127],"these":[63],"a":[69],"instantiated.":[74],"Compare":[75],"with":[76],"best":[78],"generic":[79],"attack":[83],"functions,":[86],"our":[87,113],"reduce":[89],"attacking":[91],"complexity":[92],"by":[93],"2":[94],"rounds":[95,118,131],"round":[98],"function":[99],"in":[100],"underlined":[102],"cipher.":[104],"Take":[105],"10-round":[107],"AES":[108],"as":[111],"example,":[112],"only":[115],"need":[116,128],"8":[117],"querying":[119,133],"complexity,":[120],"while":[121],"default":[123],"birthday":[124],"exhaustive":[126],"complete":[129],"10":[130],"complexity.":[134]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
