{"id":"https://openalex.org/W2332092914","doi":"https://doi.org/10.1145/2897795.2897818","title":"Linear Cryptanalysis of Quasigroup Block Cipher","display_name":"Linear Cryptanalysis of Quasigroup Block Cipher","publication_year":2016,"publication_date":"2016-04-05","ids":{"openalex":"https://openalex.org/W2332092914","doi":"https://doi.org/10.1145/2897795.2897818","mag":"2332092914"},"language":"en","primary_location":{"id":"doi:10.1145/2897795.2897818","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897795.2897818","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073894203","display_name":"Leonora Gerlock","orcid":null},"institutions":[{"id":"https://openalex.org/I122266389","display_name":"University of Nebraska at Omaha","ror":"https://ror.org/04yrkc140","country_code":"US","type":"education","lineage":["https://openalex.org/I122266389"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Leonora Gerlock","raw_affiliation_strings":["University of Nebraska at Omaha, Omaha, NE"],"affiliations":[{"raw_affiliation_string":"University of Nebraska at Omaha, Omaha, NE","institution_ids":["https://openalex.org/I122266389"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009898680","display_name":"Abhishek Parakh","orcid":"https://orcid.org/0000-0003-0082-2162"},"institutions":[{"id":"https://openalex.org/I122266389","display_name":"University of Nebraska at Omaha","ror":"https://ror.org/04yrkc140","country_code":"US","type":"education","lineage":["https://openalex.org/I122266389"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abhishek Parakh","raw_affiliation_strings":["University of Nebraska at Omaha, Omaha, NE"],"affiliations":[{"raw_affiliation_string":"University of Nebraska at Omaha, Omaha, NE","institution_ids":["https://openalex.org/I122266389"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5073894203"],"corresponding_institution_ids":["https://openalex.org/I122266389"],"apc_list":null,"apc_paid":null,"fwci":0.15952202,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56459011,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9646000266075134,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quasigroup","display_name":"Quasigroup","score":0.7839340567588806},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6950090527534485},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.531245231628418},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5270448327064514},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5260976552963257},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.5195944309234619},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.46030193567276},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.41652151942253113},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3964553475379944},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36119532585144043},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.32505401968955994},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28756675124168396},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2503625452518463},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.21651020646095276},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.1494423747062683},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11526456475257874}],"concepts":[{"id":"https://openalex.org/C198800484","wikidata":"https://www.wikidata.org/wiki/Q1503423","display_name":"Quasigroup","level":2,"score":0.7839340567588806},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6950090527534485},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.531245231628418},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5270448327064514},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5260976552963257},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.5195944309234619},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.46030193567276},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.41652151942253113},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3964553475379944},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36119532585144043},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.32505401968955994},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28756675124168396},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2503625452518463},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.21651020646095276},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.1494423747062683},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11526456475257874}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2897795.2897818","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2897795.2897818","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1964723977","https://openalex.org/W2010870387","https://openalex.org/W2029596609","https://openalex.org/W2047596814","https://openalex.org/W2065649774","https://openalex.org/W2115820978","https://openalex.org/W2139518703","https://openalex.org/W2151873033","https://openalex.org/W2339281130","https://openalex.org/W7027432354"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W4310649982","https://openalex.org/W2942137924","https://openalex.org/W4236344152","https://openalex.org/W1588312135","https://openalex.org/W3154315844","https://openalex.org/W2949851597","https://openalex.org/W2571528214","https://openalex.org/W4249223604","https://openalex.org/W2995687140"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"the":[3,60,64,72,85,90,98,101,106,114,122,129],"results":[4,143],"of":[5,9,59,66,74,100,113],"a":[6,39,43,55,81,95,136],"linear":[7,40,57,102,137,152],"cryptanalysis":[8,41,103,153],"quasigroup":[10,14,45,61,86,91,115,156],"block":[11,15,46,62,87],"cipher.":[12,47,88],"The":[13],"cipher":[16,157],"is":[17,104,140,149,158],"being":[18],"developed":[19],"for":[20],"resource":[21],"constrained":[22],"environments,":[23],"especially":[24],"SCADA":[25],"systems.":[26],"Here":[27],"we":[28,51],"determine":[29,54,120],"if":[30],"any":[31],"key":[32,123,147],"material":[33,148],"can":[34],"be":[35],"found":[36],"by":[37],"conducting":[38],"on":[42,84,105],"simplified":[44],"Using":[48],"Matsui's":[49],"algorithm":[50],"seek":[52],"to":[53,69,79,118,160],"suitable":[56],"approximation":[58,138],"cipher,":[63],"number":[65],"plaintext-ciphertext":[67],"pairs":[68],"test,":[70],"and":[71,76,131,154],"amount":[73],"time":[75],"space":[77],"required":[78],"mount":[80],"known-plaintext":[82],"attack":[83],"Since":[89],"does":[92],"not":[93],"use":[94],"Feistel":[96],"network,":[97],"focus":[99],"keyed":[107],"transformation":[108],"during":[109,126],"table":[110],"lookup":[111],"operations":[112],"in":[116],"order":[117],"1)":[119],"how":[121],"bits":[124],"used":[125],"encryption":[127],"impact":[128],"ciphertext":[130],"from":[132],"this":[133],"2)":[134],"find":[135],"that":[139,145],"non-negligible.":[141],"Our":[142],"showed":[144],"no":[146],"recovered":[150],"using":[151],"consequently":[155],"resistant":[159],"such":[161],"an":[162],"attack.":[163]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
