{"id":"https://openalex.org/W4401808464","doi":"https://doi.org/10.1109/tc.2024.3449040","title":"Single-Key Attack on Full-Round Shadow Designed for IoT Nodes","display_name":"Single-Key Attack on Full-Round Shadow Designed for IoT Nodes","publication_year":2024,"publication_date":"2024-08-23","ids":{"openalex":"https://openalex.org/W4401808464","doi":"https://doi.org/10.1109/tc.2024.3449040"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2024.3449040","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tc.2024.3449040","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100385424","display_name":"Yuhan Zhang","orcid":"https://orcid.org/0000-0002-8978-8863"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuhan Zhang","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Science, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-8978-8863","affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Science, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-6244-3489","affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081296719","display_name":"Lei Zhang","orcid":"https://orcid.org/0000-0002-2314-9700"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Zhang","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Science, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-2314-9700","affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113381043","display_name":"Yafei Zheng","orcid":"https://orcid.org/0000-0001-7550-0251"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yafei Zheng","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Science, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-7550-0251","affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Science, Beijing, China","institution_ids":["https://openalex.org/I4210128818"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100385424"],"corresponding_institution_ids":["https://openalex.org/I4210128818"],"apc_list":null,"apc_paid":null,"fwci":0.6623,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74530982,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"73","issue":"12","first_page":"2776","last_page":"2790"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9557999968528748,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9484000205993652,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7416971921920776},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.686485230922699},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5304564833641052},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4840792715549469},{"id":"https://openalex.org/keywords/shadow","display_name":"Shadow (psychology)","score":0.4514932334423065},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42240574955940247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7416971921920776},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.686485230922699},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5304564833641052},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4840792715549469},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.4514932334423065},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42240574955940247},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2024.3449040","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/tc.2024.3449040","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.550000011920929,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[{"id":"https://openalex.org/G7838409408","display_name":null,"funder_award_id":"62072445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W45372631","https://openalex.org/W197228877","https://openalex.org/W369300053","https://openalex.org/W1427832936","https://openalex.org/W1522919234","https://openalex.org/W1629301835","https://openalex.org/W1894646615","https://openalex.org/W1904723009","https://openalex.org/W1937380053","https://openalex.org/W1964723977","https://openalex.org/W2190847501","https://openalex.org/W2281317404","https://openalex.org/W2342403614","https://openalex.org/W2344782235","https://openalex.org/W2397410996","https://openalex.org/W2489581735","https://openalex.org/W2495518322","https://openalex.org/W2741840250","https://openalex.org/W2792256231","https://openalex.org/W3030624396","https://openalex.org/W3096993201","https://openalex.org/W3135035593","https://openalex.org/W4242172967","https://openalex.org/W4386825589","https://openalex.org/W4387917914","https://openalex.org/W4388096424","https://openalex.org/W4390959583","https://openalex.org/W6778727884"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W2893218741","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W4392589133","https://openalex.org/W2558319350","https://openalex.org/W2625093826","https://openalex.org/W1492594177","https://openalex.org/W2950174689","https://openalex.org/W4200598720"],"abstract_inverted_index":{"With":[0],"the":[1,5,20,29,62,83,87,90,105,140,152,179],"rapid":[2],"advancement":[3],"of":[4,7,24,49,74,82,107,146,151,154,183],"Internet":[6,48],"Things":[8,50],"(IoT),":[9],"many":[10,149],"innovative":[11],"lightweight":[12],"block":[13],"ciphers":[14],"have":[15,113],"been":[16],"introduced":[17],"to":[18,138,162,169],"meet":[19],"stringent":[21],"security":[22],"demands":[23],"IoT":[25,45],"devices.":[26],"Among":[27],"these,":[28],"Shadow":[30,60,75,85],"cipher":[31],"stands":[32],"out":[33],"for":[34,41,61,142],"its":[35],"compactness,":[36],"making":[37],"it":[38,134],"particularly":[39],"well-suited":[40],"deployment":[42],"in":[43,188],"resource-constrained":[44],"nodes":[46],"(IEEE":[47],"Journal,":[51],"2021).":[52],"This":[53],"paper":[54],"demonstrates":[55],"two":[56,190],"real-time":[57,65,175],"attacks":[58],"on":[59,128,192],"first":[63],"time:":[64],"plaintext":[66,119,123,141],"recovery":[67,124],"and":[68,86,120],"key":[69,176,182],"recovery.":[70,177],"Firstly,":[71],"numerous":[72,115],"properties":[73,150],"are":[76,159,172],"discussed,":[77],"illustrating":[78],"an":[79],"equivalent":[80],"representation":[81],"two-round":[84,97],"relationship":[88],"between":[89,118],"round":[91],"keys.":[92],"Secondly,":[93],"we":[94,112],"introduce":[95],"multiple":[96],"iterative":[98],"linear":[99,109,116],"approximations.":[100],"Employing":[101],"these":[102,129,163],"approximations":[103],"enables":[104],"derivation":[106],"full-round":[108],"distinguishers.":[110],"Moreover,":[111],"uncovered":[114],"relationships":[117],"ciphertext.":[121],"Real-time":[122],"is":[125],"achievable":[126],"based":[127],"established":[130],"relationships.":[131],"On":[132],"average,":[133],"takes":[135],"5":[136],"seconds":[137],"recover":[139],"a":[143],"fixed":[144],"ciphertext":[145],"Shadow-32.":[147],"Thirdly,":[148],"propagation":[153],"difference":[155],"through":[156],"SIMON-like":[157],"function":[158],"illustrated.":[160],"According":[161],"properties,":[164],"various":[165],"differential":[166],"distinguishers":[167],"up":[168],"full":[170],"rounds":[171],"presented,":[173],"allowing":[174],"Specifically,":[178],"64-bit":[180],"master":[181],"Shadow-32":[184],"can":[185],"be":[186],"retrieved":[187],"around":[189],"days":[191],"average.":[193],"Experiments":[194],"verify":[195],"all":[196],"our":[197],"results.":[198]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
