{"id":"https://openalex.org/W3011735388","doi":"https://doi.org/10.1155/2020/4180139","title":"Minimizing Key Materials: The Even\u2013Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption","display_name":"Minimizing Key Materials: The Even\u2013Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption","publication_year":2020,"publication_date":"2020-03-10","ids":{"openalex":"https://openalex.org/W3011735388","doi":"https://doi.org/10.1155/2020/4180139","mag":"3011735388"},"language":"en","primary_location":{"id":"doi:10.1155/2020/4180139","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/4180139","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/4180139.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/4180139.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100405791","display_name":"Ping Zhang","orcid":"https://orcid.org/0000-0002-0647-0375"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ping Zhang","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114028186","display_name":"Yuan Qian","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Yuan","raw_affiliation_strings":["School of Economics and Management, Southeast University, Nanjing 211189, China"],"affiliations":[{"raw_affiliation_string":"School of Economics and Management, Southeast University, Nanjing 211189, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100405791"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.1326,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51332612,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.7252434492111206},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7154148817062378},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4197843074798584},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3820182979106903},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3391616940498352},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1272832453250885}],"concepts":[{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.7252434492111206},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7154148817062378},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4197843074798584},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3820182979106903},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3391616940498352},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1272832453250885}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/4180139","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/4180139","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/4180139.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e88a16e816074292a054efc06779b3c7","is_oa":true,"landing_page_url":"https://doaj.org/article/e88a16e816074292a054efc06779b3c7","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/4180139","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/4180139","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/4180139.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.41999998688697815}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3011735388.pdf","grobid_xml":"https://content.openalex.org/works/W3011735388.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W755522289","https://openalex.org/W1539249970","https://openalex.org/W1744216657","https://openalex.org/W1810232834","https://openalex.org/W1884480624","https://openalex.org/W2064939672","https://openalex.org/W2130574782","https://openalex.org/W2134553300","https://openalex.org/W2167606175","https://openalex.org/W2185381909","https://openalex.org/W2204642948","https://openalex.org/W2240009439","https://openalex.org/W2549014315","https://openalex.org/W2569709881","https://openalex.org/W2803828316","https://openalex.org/W2900976073","https://openalex.org/W2906729745","https://openalex.org/W2906954740","https://openalex.org/W2907063267"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829"],"abstract_inverted_index":{"The":[0],"Even\u2013Mansour":[1,45,61,166],"cipher":[2,46,62,167],"has":[3,25],"been":[4,26],"widely":[5],"used":[6],"in":[7,30],"block":[8],"ciphers":[9,13],"and":[10,19,67,102,117,141],"lightweight":[11,113],"symmetric-key":[12],"because":[14],"of":[15,43,59,98,138,146,161],"its":[16,48],"simple":[17],"structure":[18],"strict":[20],"provable":[21],"security.":[22],"Its":[23],"research":[24],"a":[27,64],"hot":[28],"topic":[29],"cryptography.":[31],"This":[32],"paper":[33],"focuses":[34],"on":[35],"the":[36,40,44,53,60,95,99,105,136,139,144,147,159,162],"problem":[37,156],"to":[38,82,112,122,157],"minimize":[39],"key":[41,66,100],"material":[42,101],"while":[47],"security":[49,70,120,160],"bound":[50],"remains":[51],"essentially":[52],"same.":[54],"We":[55],"introduce":[56],"four":[57,76],"structures":[58,77],"with":[63,168],"short":[65,169],"derive":[68],"their":[69,119],"by":[71],"Patarin\u2019s":[72],"H-coefficients":[73],"technique.":[74],"These":[75],"are":[78],"proven":[79],"secure":[80],"up":[81,121],"<mml:math":[83,124],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[84,125],"id=\"M1\"><mml:mrow><mml:mrow><mml:mover":[85],"accent=\"true\"><mml:mi>O</mml:mi><mml:mo>\u02dc</mml:mo></mml:mover></mml:mrow><mml:mfenced":[86],"open=\"(\"":[87],"close=\")\"":[88],"separators=\"|\"><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msup><mml:mo>/</mml:mo><mml:mi>\u03bc</mml:mi></mml:mrow></mml:mfenced></mml:mrow></mml:math>":[89],"adversarial":[90,131],"queries,":[91,132],"where":[92,133],"k":[93],"is":[94,104,135,143],"bit":[96],"length":[97],"\u03bc":[103],"maximal":[106],"multiplicity.":[107],"Then,":[108],"we":[109,150],"apply":[110],"them":[111],"authenticated":[114],"encryption":[115],"modes":[116],"prove":[118],"about":[123],"id=\"M2\"><mml:mrow><mml:mtext>min</mml:mtext><mml:mfenced":[126],"open=\"{\"":[127],"close=\"}\"":[128],"separators=\"|\"><mml:mrow><mml:mi>b</mml:mi><mml:mo>/</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mi>c</mml:mi><mml:mo>,</mml:mo><mml:mi>k</mml:mi><mml:mo>\u2212</mml:mo><mml:mtext>log":[129],"</mml:mtext><mml:mi>\u03bc</mml:mi></mml:mrow></mml:mfenced></mml:mrow></mml:math>-bit":[130],"b":[134],"size":[137],"permutation":[140],"c":[142],"capacity":[145],"permutation.":[148],"Finally,":[149],"leave":[151],"it":[152],"as":[153],"an":[154],"open":[155],"settle":[158],"t":[163],"-round":[164],"iterated":[165],"keys.":[170]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
