{"id":"https://openalex.org/W4400111272","doi":"https://doi.org/10.1109/jiot.2024.3420177","title":"Preimage Attacks on Xoodyak and Gaston Based on Algebraic Strategies","display_name":"Preimage Attacks on Xoodyak and Gaston Based on Algebraic Strategies","publication_year":2024,"publication_date":"2024-06-28","ids":{"openalex":"https://openalex.org/W4400111272","doi":"https://doi.org/10.1109/jiot.2024.3420177"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3420177","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3420177","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035898624","display_name":"Qinggan Fu","orcid":"https://orcid.org/0000-0002-3095-5954"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qinggan Fu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103144514","display_name":"Yin Lv","orcid":"https://orcid.org/0000-0001-8021-6183"},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yin Lv","raw_affiliation_strings":["College of Computer Science, South China Normal University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, South China Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I187400657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062494507","display_name":"Zhiquan Liu","orcid":"https://orcid.org/0000-0002-3934-2177"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Liu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100444776","display_name":"Yingying Li","orcid":"https://orcid.org/0000-0002-3999-2647"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingying Li","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054257130","display_name":"Ling Song","orcid":"https://orcid.org/0000-0001-9298-7313"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ling Song","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5035898624"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":1.399,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.7465035,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"11","issue":"19","first_page":"31368","last_page":"31384"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10948","display_name":"Advanced Combinatorial Mathematics","score":0.8468999862670898,"subfield":{"id":"https://openalex.org/subfields/2607","display_name":"Discrete Mathematics and Combinatorics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10948","display_name":"Advanced Combinatorial Mathematics","score":0.8468999862670898,"subfield":{"id":"https://openalex.org/subfields/2607","display_name":"Discrete Mathematics and Combinatorics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11727","display_name":"Advanced Algebra and Logic","score":0.8216999769210815,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.8147000074386597,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7058165073394775},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.5770987868309021},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.4823545813560486},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4425967335700989},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.225588858127594}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7058165073394775},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.5770987868309021},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.4823545813560486},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4425967335700989},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.225588858127594},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3420177","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3420177","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3210377478","display_name":null,"funder_award_id":"62132008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5242007575","display_name":null,"funder_award_id":"62372213","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6220089879","display_name":null,"funder_award_id":"61825203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8395670599","display_name":null,"funder_award_id":"62332007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8532392318","display_name":null,"funder_award_id":"23KJ28","funder_id":"https://openalex.org/F4320329173","funder_display_name":"Youth Science Foundation of Henan Normal University"},{"id":"https://openalex.org/G8825203574","display_name":null,"funder_award_id":"U22B2028","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329173","display_name":"Youth Science Foundation of Henan Normal University","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1599175145","https://openalex.org/W2160584199","https://openalex.org/W2550770775","https://openalex.org/W2619630761","https://openalex.org/W2740336530","https://openalex.org/W2947154757","https://openalex.org/W2968774960","https://openalex.org/W3002119681","https://openalex.org/W3045281960","https://openalex.org/W3088704016","https://openalex.org/W3094390539","https://openalex.org/W3155791664","https://openalex.org/W4240574532","https://openalex.org/W4312225702","https://openalex.org/W4365807512","https://openalex.org/W4384996345","https://openalex.org/W4385654092","https://openalex.org/W4386844093","https://openalex.org/W4394805016"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"As":[0,157],"the":[1,9,20,26,92,121,133,160,218,232],"Internet":[2],"of":[3,22,28,94,124,162,241],"Things":[4],"(IoT)":[5],"continues":[6],"to":[7,11,53,138,195,212,227],"grow,":[8],"urgency":[10],"bolster":[12],"IoT":[13,60],"device":[14],"security":[15,21,93],"escalates,":[16],"particularly":[17],"in":[18,47,132,136],"evaluating":[19],"lightweight":[23,49,56,96],"ciphers.":[24],"Since":[25],"inception":[27],"Keccak":[29],"(also":[30],"known":[31],"as":[32],"SHA-3),":[33],"embedding":[34],"a":[35,38,44,104,115,158,164,170,213,224],"permutation":[36],"within":[37,83],"certain":[39],"operational":[40],"mode":[41],"has":[42],"become":[43],"pivotal":[45],"approach":[46],"designing":[48],"cryptography.":[50],"This":[51,87,216],"led":[52],"numerous":[54],"permutation-based":[55],"ciphers":[57],"tailored":[58],"for":[59,166,182],"applications.":[61],"Among":[62],"them,":[63],"Xoodyak":[64,154],"and":[65,70,113,155,202,248],"Gaston":[66,238],"are":[67],"typical":[68],"examples":[69],"even":[71],"incorporate":[72],"Keccak\u2019s":[73],"nonlinear":[74],"operation":[75],"<inline-formula":[76,125,174,189,196,206,242,249],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[77,126,175,190,197,207,243,250],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[78,127,176,191,198,208,244,251],"<tex-math":[79,128,177,192,199,209,245,252],"notation=\"LaTeX\">$\\chi":[80,129],"$":[81,130],"</tex-math></inline-formula>":[82,131,179,194,201,211,247],"their":[84],"round":[85],"functions.":[86],"article":[88],"focuses":[89],"on":[90,148,153,236],"assessing":[91],"Keccak-like":[95],"hash":[97],"functions":[98],"against":[99,223],"preimage":[100,106,165,221,234],"attacks.":[101],"We":[102],"introduce":[103],"generic":[105],"attack":[107,222],"framework":[108],"from":[109,188,205],"an":[110],"algebraic":[111,122],"perspective":[112],"propose":[114],"new":[116],"linearization":[117],"method":[118],"that":[119,181],"leverages":[120],"properties":[123],"permutation.":[134],"Additionally,":[135],"order":[137],"find":[139],"good":[140],"guessing":[141],"strategies,":[142],"we":[143,230],"develop":[144],"automatic":[145],"tools":[146],"based":[147],"bit-level":[149],"mixed-integer":[150],"linear":[151],"programming":[152],"Gaston.":[156],"result,":[159],"complexity":[161],"finding":[163],"2-round":[167],"Xoodyak-XOF":[168,184,226],"with":[169,239],"128-bit":[171],"digest":[172],"is":[173],"notation=\"LaTeX\">$2^{94.66}$":[178],"while":[180],"3-round":[183,225],"can":[185],"be":[186],"reduced":[187],"notation=\"LaTeX\">$2^{125.06}$":[193],"notation=\"LaTeX\">$2^{123.91}$":[200],"memory":[203],"consumption":[204],"notation=\"LaTeX\">$2^{97}$":[210],"negligible":[214],"level.":[215],"marks":[217],"most":[219],"efficient":[220],"date.":[228],"Furthermore,":[229],"present":[231],"first":[233],"attacks":[235],"1-/2-round":[237],"complexities":[240],"notation=\"LaTeX\">$2^{90.56}$":[246],"notation=\"LaTeX\">$2^{122.15}$":[253],"</tex-math></inline-formula>,":[254],"respectively.":[255]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
