{"id":"https://openalex.org/W2991237138","doi":"https://doi.org/10.1155/2020/4898612","title":"Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64","display_name":"Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64","publication_year":2020,"publication_date":"2020-01-21","ids":{"openalex":"https://openalex.org/W2991237138","doi":"https://doi.org/10.1155/2020/4898612","mag":"2991237138"},"language":"en","primary_location":{"id":"doi:10.1155/2020/4898612","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/4898612","pdf_url":"http://downloads.hindawi.com/journals/scn/2020/4898612.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"preprint","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2020/4898612.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049512015","display_name":"Mingjiang Huang","orcid":"https://orcid.org/0000-0003-1856-689X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingjiang Huang","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences Beijing China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences Beijing China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100328729","display_name":"Liming Wang","orcid":"https://orcid.org/0000-0002-5732-5258"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liming Wang","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","[State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China]"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"[State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China]","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049512015"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.1359,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.52325371,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.8451281785964966},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6004999876022339},{"id":"https://openalex.org/keywords/linear-map","display_name":"Linear map","score":0.5920823812484741},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5697822570800781},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.5299497842788696},{"id":"https://openalex.org/keywords/correlation-attack","display_name":"Correlation attack","score":0.4927668869495392},{"id":"https://openalex.org/keywords/linear-span","display_name":"Linear span","score":0.4873667359352112},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.4869455099105835},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.47309067845344543},{"id":"https://openalex.org/keywords/linear-space","display_name":"Linear space","score":0.4276845157146454},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.36229342222213745},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.36101049184799194},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.18750828504562378}],"concepts":[{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.8451281785964966},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6004999876022339},{"id":"https://openalex.org/C49766605","wikidata":"https://www.wikidata.org/wiki/Q207643","display_name":"Linear map","level":2,"score":0.5920823812484741},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5697822570800781},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.5299497842788696},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.4927668869495392},{"id":"https://openalex.org/C133226019","wikidata":"https://www.wikidata.org/wiki/Q209812","display_name":"Linear span","level":2,"score":0.4873667359352112},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.4869455099105835},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.47309067845344543},{"id":"https://openalex.org/C176370821","wikidata":"https://www.wikidata.org/wiki/Q1826459","display_name":"Linear space","level":2,"score":0.4276845157146454},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36229342222213745},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.36101049184799194},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.18750828504562378},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2020/4898612","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/4898612","pdf_url":"http://downloads.hindawi.com/journals/scn/2020/4898612.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f3b3d9307a614c84b68b8d3a8ceb7877","is_oa":true,"landing_page_url":"https://doaj.org/article/f3b3d9307a614c84b68b8d3a8ceb7877","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"},{"id":"mag:2991237138","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2019/1319.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null}],"best_oa_location":{"id":"doi:10.1155/2020/4898612","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/4898612","pdf_url":"http://downloads.hindawi.com/journals/scn/2020/4898612.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G466649759","display_name":null,"funder_award_id":"2017Y","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7625510445","display_name":null,"funder_award_id":"2017YFB0801900","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8340078520","display_name":null,"funder_award_id":"2017YF","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8823009050","display_name":null,"funder_award_id":"2017YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2991237138.pdf","grobid_xml":"https://content.openalex.org/works/W2991237138.grobid-xml"},"referenced_works_count":4,"referenced_works":["https://openalex.org/W2059193699","https://openalex.org/W2109410667","https://openalex.org/W2186286189","https://openalex.org/W2599205485"],"related_works":["https://openalex.org/W3000932475","https://openalex.org/W2173139932","https://openalex.org/W2901118812","https://openalex.org/W3105154446","https://openalex.org/W2969637011","https://openalex.org/W3028694789","https://openalex.org/W2966457083","https://openalex.org/W199966775","https://openalex.org/W2133084413","https://openalex.org/W2396695936","https://openalex.org/W3154320256","https://openalex.org/W307345432","https://openalex.org/W2490337235","https://openalex.org/W2406150044","https://openalex.org/W2793352162","https://openalex.org/W2316387456","https://openalex.org/W2378000371","https://openalex.org/W2017916425","https://openalex.org/W1814665593","https://openalex.org/W2963976226"],"abstract_inverted_index":{"Linear":[0],"cryptanalysis":[1],"is":[2,33,88],"an":[3,30,198],"important":[4],"evaluation":[5],"method":[6],"for":[7,22,78,169,178,210,224],"cryptographic":[8],"primitives":[9],"against":[10],"key":[11],"recovery":[12],"attack.":[13],"In":[14],"this":[15,136],"paper,":[16],"we":[17,163],"revisit":[18],"the":[19,37,48,54,57,61,94,101,107,119,127,145,152,155,159,166],"Walsh":[20],"transformation":[21],"linear":[23,74,170,176,184,200,205,215,220,230,246],"correlation":[24,43,51,234,250],"calculation":[25],"of":[26,41,60,72,122,141,154,235,251],"modular":[27,79],"addition,":[28],"and":[29,93,116,125,158,202,212,217],"efficient":[31],"algorithm":[32],"proposed":[34],"to":[35],"construct":[36],"input-output":[38],"mask":[39,87,92,96,112],"space":[40,59],"specified":[42],"weight.":[44],"By":[45,135],"filtering":[46],"out":[47],"impossible":[49],"large":[50,139],"weights":[52],"in":[53,126,144],"first":[55,62,105],"round,":[56],"search":[58,142,161,167],"round":[63],"can":[64,97,132,148,164],"be":[65,98,133,149],"substantially":[66],"reduced.":[67],"We":[68,104],"introduce":[69],"a":[70,138,181,203,213,218,228,233,249],"concept":[71],"combinational":[73],"approximation":[75],"table":[76],"(cLAT)":[77],"addition":[80],"with":[81,180,232,248],"two":[82],"inputs.":[83],"When":[84],"one":[85],"input":[86,91,111],"fixed,":[89],"another":[90],"output":[95],"obtained":[99,223],"by":[100],"Splitting-Lookup-Recombination":[102],"approach.":[103],"split":[106],"n":[108],"-bit":[109],"fixed":[110],"into":[113],"several":[114],"subvectors":[115],"then":[117],"find":[118],"corresponding":[120],"bits":[121],"other":[123],"masks,":[124],"recombination":[128],"phase,":[129],"pruning":[130],"conditions":[131],"used.":[134],"approach,":[137],"number":[140],"branches":[143],"middle":[146],"rounds":[147],"pruned.":[150],"With":[151],"combination":[153],"optimization":[156],"strategies":[157],"branch-and-bound":[160],"algorithm,":[162],"improve":[165],"efficiency":[168],"characteristics":[171,247],"on":[172],"ARX":[173],"ciphers.":[174],"The":[175],"hulls":[177],"SPECK32/48/64":[179],"higher":[182],"average":[183],"potential":[185],"(<mml:math":[186],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[187,237,253],"id=\"M1\"><mml:mrow><mml:mtext>ALP</mml:mtext></mml:mrow></mml:math>)":[188],"than":[189],"existing":[190],"results":[191],"have":[192,207],"been":[193,208,240],"obtained.":[194,241],"For":[195,226,242],"SPARX":[196],"variants,":[197],"11-round":[199],"trail":[201,216,231],"10-round":[204,214],"hull":[206,221],"found":[209],"SPARX-64":[211],"9-round":[219],"are":[222,255],"SPARX-128.":[225],"Chaskey,":[227],"5-round":[229],"<mml:math":[236,252],"id=\"M2\"><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mo>\u2212</mml:mo><mml:mn>61</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:math>":[238],"has":[239],"CHAM-64,":[243],"34/35-round":[244],"optimal":[245],"id=\"M3\"><mml:mrow><mml:mrow><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mo>\u2212</mml:mo><mml:mn>31</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mo>/</mml:mo><mml:mrow><mml:msup><mml:mrow><mml:mn>2</mml:mn></mml:mrow><mml:mrow><mml:mo>\u2212</mml:mo><mml:mn>33</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mrow></mml:mrow></mml:math>":[254],"found.":[256]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
