{"id":"https://openalex.org/W3047427268","doi":"https://doi.org/10.1109/tifs.2020.3014490","title":"Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks","display_name":"Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks","publication_year":2020,"publication_date":"2020-08-05","ids":{"openalex":"https://openalex.org/W3047427268","doi":"https://doi.org/10.1109/tifs.2020.3014490","mag":"3047427268"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2020.3014490","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2020.3014490","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019287385","display_name":"Changhai Ou","orcid":"https://orcid.org/0000-0001-9679-6223"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Changhai Ou","raw_affiliation_strings":["Hardware and Embedded Systems Laboratory (HESL), School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0001-9679-6223","affiliations":[{"raw_affiliation_string":"Hardware and Embedded Systems Laboratory (HESL), School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022517034","display_name":"Chengju Zhou","orcid":"https://orcid.org/0000-0003-0795-4977"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chengju Zhou","raw_affiliation_strings":["Hardware and Embedded Systems Laboratory (HESL), School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0003-0795-4977","affiliations":[{"raw_affiliation_string":"Hardware and Embedded Systems Laboratory (HESL), School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002694277","display_name":"Siew-Kei Lam","orcid":"https://orcid.org/0000-0002-8346-2635"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Siew-Kei Lam","raw_affiliation_strings":["Hardware and Embedded Systems Laboratory (HESL), School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-8346-2635","affiliations":[{"raw_affiliation_string":"Hardware and Embedded Systems Laboratory (HESL), School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076931362","display_name":"Guiyuan Jiang","orcid":"https://orcid.org/0000-0002-1398-821X"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Guiyuan Jiang","raw_affiliation_strings":["Hardware and Embedded Systems Laboratory (HESL), School of Computer Science and Engineering, Nanyang Technological University, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-1398-821X","affiliations":[{"raw_affiliation_string":"Hardware and Embedded Systems Laboratory (HESL), School of Computer Science and Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5019287385"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.4077,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69695103,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"16","issue":null,"first_page":"418","last_page":"430"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/divide-and-conquer-algorithms","display_name":"Divide and conquer algorithms","score":0.8371975421905518},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8237117528915405},{"id":"https://openalex.org/keywords/collision","display_name":"Collision","score":0.6035131216049194},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5911054015159607},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.5533398389816284},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40431174635887146},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3217983543872833},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.273476243019104},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18821409344673157}],"concepts":[{"id":"https://openalex.org/C71559656","wikidata":"https://www.wikidata.org/wiki/Q671298","display_name":"Divide and conquer algorithms","level":2,"score":0.8371975421905518},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8237117528915405},{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.6035131216049194},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5911054015159607},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.5533398389816284},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40431174635887146},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3217983543872833},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.273476243019104},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18821409344673157},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2020.3014490","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2020.3014490","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W165535416","https://openalex.org/W181478300","https://openalex.org/W1516750986","https://openalex.org/W1519539754","https://openalex.org/W1532559214","https://openalex.org/W1562542037","https://openalex.org/W1583090871","https://openalex.org/W1752847028","https://openalex.org/W1973823100","https://openalex.org/W2048755632","https://openalex.org/W2078728094","https://openalex.org/W2116051280","https://openalex.org/W2154909745","https://openalex.org/W2208250432","https://openalex.org/W2474114598","https://openalex.org/W2495498226","https://openalex.org/W2554114400","https://openalex.org/W2607766774","https://openalex.org/W2741258396","https://openalex.org/W2784626893","https://openalex.org/W2889339102","https://openalex.org/W2914572864","https://openalex.org/W3011290641","https://openalex.org/W3158869076","https://openalex.org/W3161081806","https://openalex.org/W4285719527","https://openalex.org/W6631075134","https://openalex.org/W6634691088","https://openalex.org/W6759495720","https://openalex.org/W6794095452"],"related_works":["https://openalex.org/W2352794675","https://openalex.org/W1539994214","https://openalex.org/W2051228988","https://openalex.org/W4247094814","https://openalex.org/W108531593","https://openalex.org/W2111712077","https://openalex.org/W2479441139","https://openalex.org/W1539666818","https://openalex.org/W3029301557","https://openalex.org/W2801025257"],"abstract_inverted_index":{"Several":[0],"combined":[1],"attacks":[2,17],"have":[3],"shown":[4],"promising":[5],"results":[6,226],"in":[7],"recovering":[8],"cryptographic":[9],"keys":[10],"by":[11,160],"introducing":[12],"collision":[13,34,57,79,140,240],"information":[14,58],"into":[15,30,107,198],"divide-and-conquer":[16],"to":[18,68,92,109,166,203],"transform":[19],"a":[20,31,125,156],"part":[21],"of":[22,56,64,114,121,146,177,239,248],"the":[23,44,53,99,111,118,143,152,169,175,196,209,215,220,232,237,245],"best":[24],"key":[25,122,197,222],"candidates":[26,154,211],"within":[27],"given":[28,144],"thresholds":[29,45],"much":[32],"smaller":[33],"space.":[35],"However,":[36],"these":[37],"Collision-Optimized":[38],"Divide-and-Conquer":[39],"Attacks":[40],"(CODCAs)":[41],"uniformly":[42],"demarcate":[43],"for":[46,129,168,186],"all":[47],"sub-keys,":[48],"which":[49],"is":[50,132,180],"unreasonable.":[51],"Moreover,":[52],"inadequate":[54],"exploitation":[55],"and":[59,117,182,212,235],"backward":[60],"fault":[61],"tolerance":[62],"mechanisms":[63,138],"CODCAs":[65,74,130],"also":[66],"lead":[67],"low":[69],"attack":[70],"efficiency.":[71],"Finally,":[72],"existing":[73],"mainly":[75],"focus":[76],"on":[77],"improving":[78],"detection":[80],"algorithms":[81],"but":[82],"lack":[83],"theoretical":[84],"basis.":[85],"We":[86],"exploit":[87,164,205],"Correlation-Enhanced":[88],"Collision":[89],"Attack":[90,95],"(CECA)":[91],"optimize":[93],"Template":[94],"(TA).":[96],"To":[97],"overcome":[98],"above-mentioned":[100],"problems,":[101],"we":[102],"first":[103,135],"introduce":[104],"guessing":[105,161],"theory":[106],"TA":[108],"enable":[110],"quick":[112],"estimation":[113],"success":[115,246],"probability":[116,158,247],"corresponding":[119],"complexity":[120,238],"recovery.":[123],"Next,":[124],"novel":[126],"Multiple-Differential":[127],"mechanism":[128,193],"(MD-CODCA)":[131],"proposed.":[133],"The":[134,224],"two":[136],"differential":[137,192],"construct":[139],"chains":[141,179],"satisfying":[142],"number":[145,176],"collisions":[147,207],"from":[148,208],"several":[149,199],"sub-keys":[150],"with":[151],"fewest":[153],"under":[155],"fixed":[157],"provided":[159],"theory,":[162],"then":[163],"them":[165],"vote":[167],"remaining":[170,178,210],"sub-keys.":[171],"This":[172],"guarantees":[173],"that":[174,228],"minimal,":[181],"makes":[183],"MD-CODCA":[184,229],"suitable":[185],"very":[187],"high":[188],"thresholds.":[189],"Our":[190],"third":[191],"simply":[194],"divides":[195],"large":[200],"non-overlapping":[201],"\u201cblocks\u201d":[202],"further":[204],"intra-block":[206],"properly":[213],"ignore":[214],"inter-block":[216],"collisions,":[217],"thus":[218],"facilitating":[219],"later":[221],"enumeration.":[223],"experimental":[225],"show":[227],"significantly":[230],"reduces":[231],"candidate":[233],"space":[234],"lowers":[236],"detection,":[241],"without":[242],"considerably":[243],"reducing":[244],"attacks.":[249]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
