{"id":"https://openalex.org/W2981979313","doi":"https://doi.org/10.1145/3331453.3361676","title":"XKX Does Not Preserve Unpredictability","display_name":"XKX Does Not Preserve Unpredictability","publication_year":2019,"publication_date":"2019-10-21","ids":{"openalex":"https://openalex.org/W2981979313","doi":"https://doi.org/10.1145/3331453.3361676","mag":"2981979313"},"language":"en","primary_location":{"id":"doi:10.1145/3331453.3361676","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3331453.3361676","pdf_url":null,"source":{"id":"https://openalex.org/S4306523809","display_name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101468894","display_name":"Ying Zou","orcid":"https://orcid.org/0000-0001-6286-6449"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I153806059","display_name":"Shanghai Business School","ror":"https://ror.org/05kf5z787","country_code":"CN","type":"education","lineage":["https://openalex.org/I153806059"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ying Zou","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China and Shanghai Business School, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China and Shanghai Business School, Shanghai, China","institution_ids":["https://openalex.org/I153806059","https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100344782","display_name":"Xiangyang Zhang","orcid":"https://orcid.org/0009-0009-5015-9478"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangyang Zhang","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100436040","display_name":"Lei Wang","orcid":"https://orcid.org/0000-0002-9090-5289"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Wang","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101468894"],"corresponding_institution_ids":["https://openalex.org/I153806059","https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15526992,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.7710521817207336},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.7526409029960632},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7428497076034546},{"id":"https://openalex.org/keywords/random-permutation","display_name":"Random permutation","score":0.7098402976989746},{"id":"https://openalex.org/keywords/pseudorandom-permutation","display_name":"Pseudorandom permutation","score":0.6924041509628296},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6879256963729858},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4731995761394501},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.46246403455734253},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45588621497154236},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.38308513164520264},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3676701784133911},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27782589197158813},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17278897762298584},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15076753497123718},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.1040528416633606},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.09225958585739136}],"concepts":[{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.7710521817207336},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.7526409029960632},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7428497076034546},{"id":"https://openalex.org/C200985842","wikidata":"https://www.wikidata.org/wiki/Q3375503","display_name":"Random permutation","level":3,"score":0.7098402976989746},{"id":"https://openalex.org/C25818197","wikidata":"https://www.wikidata.org/wiki/Q7255477","display_name":"Pseudorandom permutation","level":4,"score":0.6924041509628296},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6879256963729858},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4731995761394501},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46246403455734253},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45588621497154236},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38308513164520264},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3676701784133911},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27782589197158813},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17278897762298584},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15076753497123718},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.1040528416633606},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.09225958585739136},{"id":"https://openalex.org/C128622974","wikidata":"https://www.wikidata.org/wiki/Q849512","display_name":"Symmetric group","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3331453.3361676","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3331453.3361676","pdf_url":null,"source":{"id":"https://openalex.org/S4306523809","display_name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W142023353","https://openalex.org/W288546487","https://openalex.org/W1453172084","https://openalex.org/W1525837128","https://openalex.org/W1527081975","https://openalex.org/W1528724153","https://openalex.org/W1551493658","https://openalex.org/W1553929445","https://openalex.org/W1581346606","https://openalex.org/W1655844021","https://openalex.org/W1753861823","https://openalex.org/W1793926990","https://openalex.org/W1895415033","https://openalex.org/W1939055785","https://openalex.org/W2106337617","https://openalex.org/W2107358757","https://openalex.org/W2138992486","https://openalex.org/W2149158041","https://openalex.org/W2155115217","https://openalex.org/W2404863376","https://openalex.org/W2408669375","https://openalex.org/W2480498986","https://openalex.org/W2480510614","https://openalex.org/W2552956646","https://openalex.org/W2560190413","https://openalex.org/W2561675875","https://openalex.org/W2730675851","https://openalex.org/W2791151657","https://openalex.org/W2794700152","https://openalex.org/W2896948810","https://openalex.org/W2962967932","https://openalex.org/W2969100481","https://openalex.org/W4211071954","https://openalex.org/W4237128443","https://openalex.org/W6630565013","https://openalex.org/W6641264392"],"related_works":["https://openalex.org/W2051432161","https://openalex.org/W2553569605","https://openalex.org/W2077146536","https://openalex.org/W1972464518","https://openalex.org/W2913176662","https://openalex.org/W2346477291","https://openalex.org/W2790044991","https://openalex.org/W2533058927","https://openalex.org/W2917426586","https://openalex.org/W4302067876"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"the":[3,6,17,20,32],"security":[4,18],"of":[5,19],"XKX":[7,21,45,69],"tweakable":[8,27],"blockcipher":[9,34],"construction":[10],"is":[11],"revisited.":[12],"Proposed":[13],"at":[14],"FSE":[15],"2018,":[16],"was":[22],"proved":[23],"to":[24,55,77],"be":[25,75],"a":[26,35],"pseudorandom":[28,37],"permutation,":[29],"which":[30],"assumed":[31],"underlying":[33],"strong":[36],"random":[38],"permutation":[39],"(SPRP).":[40],"Though,":[41],"it":[42,51],"shows":[43,68],"that":[44],"does":[46],"not":[47],"preserve":[48],"unpredictability,":[49],"i.e.,":[50],"could":[52],"lead":[53],"itself":[54],"attacks":[56],"when":[57],"instantiated":[58,70],"with":[59,71],"unpredictable":[60,72],"blockciphers":[61,73],"(a":[62],"weaker":[63],"assumption":[64],"than":[65],"SPRP).":[66],"This":[67],"cannot":[74],"used":[76],"construct":[78],"secure":[79],"message":[80],"authentication":[81],"codes":[82],"(MACs).":[83]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
