{"id":"https://openalex.org/W2896056734","doi":"https://doi.org/10.1145/3207677.3278003","title":"New Observation on Division Property","display_name":"New Observation on Division Property","publication_year":2018,"publication_date":"2018-10-18","ids":{"openalex":"https://openalex.org/W2896056734","doi":"https://doi.org/10.1145/3207677.3278003","mag":"2896056734"},"language":"en","primary_location":{"id":"doi:10.1145/3207677.3278003","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3207677.3278003","pdf_url":null,"source":{"id":"https://openalex.org/S4306523741","display_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011209892","display_name":"Yiran Xing","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yiran Xing","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050743816","display_name":"Hailun Yan","orcid":"https://orcid.org/0000-0002-0592-6772"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hailun Yan","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082713075","display_name":"Xuejia Lai","orcid":"https://orcid.org/0000-0001-5917-4783"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuejia Lai","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China and Westone Cryptologic Research Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China and Westone Cryptologic Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011209892"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.077,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.43970353,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/division","display_name":"Division (mathematics)","score":0.8449671268463135},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.7162904739379883},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.7041175961494446},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.690888524055481},{"id":"https://openalex.org/keywords/boolean-satisfiability-problem","display_name":"Boolean satisfiability problem","score":0.5879828333854675},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5844974517822266},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5624246001243591},{"id":"https://openalex.org/keywords/satisfiability","display_name":"Satisfiability","score":0.5433853268623352},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5228310227394104},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.505915105342865},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48976898193359375},{"id":"https://openalex.org/keywords/exclusive-or","display_name":"Exclusive or","score":0.46154123544692993},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.43514472246170044},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.40344107151031494},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4020722508430481},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.359500527381897},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.27794453501701355},{"id":"https://openalex.org/keywords/logic-gate","display_name":"Logic gate","score":0.13381537795066833},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11882495880126953}],"concepts":[{"id":"https://openalex.org/C60798267","wikidata":"https://www.wikidata.org/wiki/Q1226939","display_name":"Division (mathematics)","level":2,"score":0.8449671268463135},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.7162904739379883},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.7041175961494446},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.690888524055481},{"id":"https://openalex.org/C6943359","wikidata":"https://www.wikidata.org/wiki/Q875276","display_name":"Boolean satisfiability problem","level":2,"score":0.5879828333854675},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5844974517822266},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5624246001243591},{"id":"https://openalex.org/C168773769","wikidata":"https://www.wikidata.org/wiki/Q1350299","display_name":"Satisfiability","level":2,"score":0.5433853268623352},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5228310227394104},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.505915105342865},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48976898193359375},{"id":"https://openalex.org/C35898486","wikidata":"https://www.wikidata.org/wiki/Q498186","display_name":"Exclusive or","level":3,"score":0.46154123544692993},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.43514472246170044},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.40344107151031494},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4020722508430481},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.359500527381897},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27794453501701355},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.13381537795066833},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11882495880126953},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3207677.3278003","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3207677.3278003","pdf_url":null,"source":{"id":"https://openalex.org/S4306523741","display_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1540875416","https://openalex.org/W1599054856","https://openalex.org/W1926480282","https://openalex.org/W2166473670","https://openalex.org/W2476423892","https://openalex.org/W2479327246","https://openalex.org/W2495040881","https://openalex.org/W2513242685","https://openalex.org/W2549714595","https://openalex.org/W2565885828","https://openalex.org/W2603059141","https://openalex.org/W2613849344","https://openalex.org/W2735771763","https://openalex.org/W2744563817","https://openalex.org/W2769206030","https://openalex.org/W2912272895","https://openalex.org/W2949078646","https://openalex.org/W3029430779","https://openalex.org/W6635990699"],"related_works":["https://openalex.org/W3176904788","https://openalex.org/W21597398","https://openalex.org/W4298153058","https://openalex.org/W2408080066","https://openalex.org/W2268872489","https://openalex.org/W1913543287","https://openalex.org/W2014111643","https://openalex.org/W2963044240","https://openalex.org/W2076399409","https://openalex.org/W2102364390"],"abstract_inverted_index":{"Division1":[0],"property":[1,6,43,79,106],"is":[2],"a":[3],"generalized":[4],"integral":[5],"proposed":[7,30],"by":[8,62],"Todo":[9],"at":[10],"Eurocrypt":[11],"2015,":[12],"which":[13],"has":[14,119],"been":[15,121],"used":[16,74,127],"in":[17,75,123,128],"the":[18,41,57,68,77,104,109,115],"analysis":[19],"of":[20,44,70,81],"various":[21],"symmetric-key":[22],"algorithms.":[23],"At":[24],"Asiacrypt":[25],"2017,":[26],"Sun":[27,63],"et":[28,64],"al.":[29],"automatic":[31],"tools":[32],"based":[33,92],"on":[34,93],"Boolean":[35],"Satisfiability":[36],"Problem":[37],"(SAT)":[38],"to":[39,55,102],"detect":[40],"division":[42,78,105],"ARX":[45],"ciphers.":[46],"In":[47],"this":[48],"paper,":[49],"we":[50,99],"first":[51],"exploit":[52],"Karnaugh":[53],"map":[54],"simplify":[56],"logical":[58],"SAT":[59],"expressions":[60,73],"given":[61],"al.,":[65],"thereby":[66],"reducing":[67],"number":[69],"variables":[71],"and":[72,84],"modeling":[76],"propagation":[80,107],"Copy,":[82],"AND":[83],"XOR,":[85],"as":[86,88],"well":[87],"other":[89],"complicated":[90],"operations":[91],"these":[94],"three":[95],"basic":[96],"operations.":[97],"Then,":[98],"show":[100],"how":[101],"model":[103],"against":[108],"modular":[110,116],"multiplication":[111,117],"operation.":[112],"Note":[113],"that":[114],"operation":[118],"not":[120],"handled":[122],"previous":[124],"work":[125],"but":[126],"some":[129],"block":[130],"ciphers":[131],"like":[132],"IDEA.":[133]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
