{"id":"https://openalex.org/W3036385577","doi":"https://doi.org/10.1109/tc.2020.3002795","title":"A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks","display_name":"A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks","publication_year":2020,"publication_date":"2020-06-16","ids":{"openalex":"https://openalex.org/W3036385577","doi":"https://doi.org/10.1109/tc.2020.3002795","mag":"3036385577"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2020.3002795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2020.3002795","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019287385","display_name":"Changhai Ou","orcid":"https://orcid.org/0000-0001-9679-6223"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Changhai Ou","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0001-9679-6223","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002694277","display_name":"Siew-Kei Lam","orcid":"https://orcid.org/0000-0002-8346-2635"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Siew-Kei Lam","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-8346-2635","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022517034","display_name":"Chengju Zhou","orcid":"https://orcid.org/0000-0003-0795-4977"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chengju Zhou","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0003-0795-4977","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076931362","display_name":"Guiyuan Jiang","orcid":"https://orcid.org/0000-0002-1398-821X"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Guiyuan Jiang","raw_affiliation_strings":["School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-1398-821X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100403380","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0001-6087-8243"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]},{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, Zhejiang, China","School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China"],"raw_orcid":"https://orcid.org/0000-0001-6087-8243","affiliations":[{"raw_affiliation_string":"Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I45928872","https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5019287385"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.2718,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63637747,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"69","issue":"11","first_page":"1694","last_page":"1706"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8263725638389587},{"id":"https://openalex.org/keywords/collision","display_name":"Collision","score":0.7619030475616455},{"id":"https://openalex.org/keywords/divide-and-conquer-algorithms","display_name":"Divide and conquer algorithms","score":0.7410799264907837},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6529145240783691},{"id":"https://openalex.org/keywords/collision-detection","display_name":"Collision detection","score":0.6405669450759888},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5659770965576172},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5554496049880981},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.4797824025154114},{"id":"https://openalex.org/keywords/jump","display_name":"Jump","score":0.46868398785591125},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.15601181983947754},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11484426259994507}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8263725638389587},{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.7619030475616455},{"id":"https://openalex.org/C71559656","wikidata":"https://www.wikidata.org/wiki/Q671298","display_name":"Divide and conquer algorithms","level":2,"score":0.7410799264907837},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6529145240783691},{"id":"https://openalex.org/C199668693","wikidata":"https://www.wikidata.org/wiki/Q1550329","display_name":"Collision detection","level":3,"score":0.6405669450759888},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5659770965576172},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5554496049880981},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.4797824025154114},{"id":"https://openalex.org/C2780695682","wikidata":"https://www.wikidata.org/wiki/Q4005959","display_name":"Jump","level":2,"score":0.46868398785591125},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.15601181983947754},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11484426259994507},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.0},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2020.3002795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2020.3002795","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"},{"id":"https://openalex.org/F4320323383","display_name":"Technische Universit\u00e4t M\u00fcnchen","ror":"https://ror.org/02kkvpp62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W54412699","https://openalex.org/W181478300","https://openalex.org/W1516750986","https://openalex.org/W1532559214","https://openalex.org/W1562542037","https://openalex.org/W1613874182","https://openalex.org/W1687247511","https://openalex.org/W1752847028","https://openalex.org/W1824405704","https://openalex.org/W1973823100","https://openalex.org/W2078728094","https://openalex.org/W2116051280","https://openalex.org/W2488711715","https://openalex.org/W2495498226","https://openalex.org/W2554114400","https://openalex.org/W2604789199","https://openalex.org/W2607766774","https://openalex.org/W2741258396","https://openalex.org/W2765784230","https://openalex.org/W2778408454","https://openalex.org/W2784626893","https://openalex.org/W2794948925","https://openalex.org/W2889339102","https://openalex.org/W2914572864","https://openalex.org/W3047427268","https://openalex.org/W3158869076","https://openalex.org/W6602164578","https://openalex.org/W6747848655","https://openalex.org/W6759495720","https://openalex.org/W6781059894","https://openalex.org/W6794095452"],"related_works":["https://openalex.org/W3138645172","https://openalex.org/W2148917807","https://openalex.org/W3215492696","https://openalex.org/W2257960210","https://openalex.org/W2028510469","https://openalex.org/W913501818","https://openalex.org/W2021628292","https://openalex.org/W4379525781","https://openalex.org/W1539666818","https://openalex.org/W1987135480"],"abstract_inverted_index":{"By":[0],"introducing":[1],"collision":[2,26,36,72,100,117],"information":[3],"into":[4,22],"divide-and-conquer":[5],"attacks,":[6],"several":[7],"existing":[8],"works":[9],"transform":[10],"the":[11,34,98,105,116,120,159,163],"original":[12],"candidate":[13],"space,":[14,27],"which":[15],"may":[16,53],"be":[17],"too":[18],"large":[19],"to":[20,74,95,114,123,146,156],"enumerate,":[21],"a":[23,81,91,137],"significantly":[24],"smaller":[25],"thus":[28],"making":[29],"key":[30,65],"recovery":[31],"possible.":[32],"However,":[33],"inefficient":[35],"detection":[37,93,118],"algorithms":[38],"and":[39,46,79,127,151],"fault":[40,140],"tolerance":[41,141],"mechanisms":[42],"make":[43],"them":[44],"time-consuming":[45],"their":[47,124],"success":[48],"rate":[49],"low.":[50],"Moreover,":[51],"they":[52],"still":[54],"leave":[55],"very":[56],"huge":[57],"chain":[58],"spaces":[59],"that":[60],"makes":[61],"it":[62],"difficult":[63],"for":[64,143],"recovery.":[66],"In":[67],"this":[68],"article,":[69],"we":[70,135],"exploit":[71],"attack":[73],"optimize":[75,153],"Template":[76],"Attack":[77],"(TA),":[78],"propose":[80],"Lightweight":[82],"Collision":[83],"Detection":[84],"(LCD)":[85],"algorithm.":[86],"The":[87],"proposed":[88],"method":[89],"exploits":[90],"jump":[92],"mechanism":[94,142,155],"efficiently":[96,157],"reduce":[97],"repetitive":[99],"detections":[101],"on":[102],"chains":[103,161],"with":[104,130,162],"same":[106],"prefix":[107],"sub-chains.":[108],"We":[109],"then":[110],"introduce":[111],"guessing":[112,125],"theory":[113],"reorder":[115],"of":[119,166],"sub-keys":[121],"according":[122],"lengths,":[126],"provide":[128],"us":[129],"an":[131],"evaluation":[132],"tool.":[133],"Finally,":[134],"design":[136],"highly":[138],"efficient":[139],"our":[144],"LCD":[145],"allow":[147],"flexible":[148],"thresholds":[149],"adjustment,":[150],"further":[152],"sieving":[154],"extract":[158],"best":[160],"largest":[164],"number":[165],"collisions.":[167],"Experimental":[168],"results":[169],"fully":[170],"demonstrate":[171],"LCD's":[172],"superiority.":[173]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
