{"id":"https://openalex.org/W4387455694","doi":"https://doi.org/10.1186/s42400-023-00188-3","title":"Generic attacks on small-state stream cipher constructions in the multi-user setting","display_name":"Generic attacks on small-state stream cipher constructions in the multi-user setting","publication_year":2023,"publication_date":"2023-10-08","ids":{"openalex":"https://openalex.org/W4387455694","doi":"https://doi.org/10.1186/s42400-023-00188-3"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00188-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00188-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00188-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00188-3","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102565318","display_name":"Jianfu Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianfu Huang","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, 510632, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, 510632, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108632500","display_name":"Ye Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Luo","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, 510632, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, 510632, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035898624","display_name":"Qinggan Fu","orcid":"https://orcid.org/0000-0002-3095-5954"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinggan Fu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, 510632, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, 510632, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079308372","display_name":"Yincen Chen","orcid":"https://orcid.org/0000-0003-3830-8169"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yincen Chen","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, 510632, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, 510632, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100407119","display_name":"Chao Wang","orcid":"https://orcid.org/0000-0003-2430-6218"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Wang","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, 510632, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, 510632, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054257130","display_name":"Ling Song","orcid":"https://orcid.org/0000-0001-9298-7313"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ling Song","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, 510632, China","National Joint Engineering Research Center of Network Security Detection and Protection Technology, Jinan University, Guangzhou, 510632, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, 510632, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"National Joint Engineering Research Center of Network Security Detection and Protection Technology, Jinan University, Guangzhou, 510632, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102565318"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":0.1716,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57277625,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7603181600570679},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.7126469612121582},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7054783701896667},{"id":"https://openalex.org/keywords/keystream","display_name":"Keystream","score":0.6716430187225342},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5382039546966553},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4922098219394684},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.42516887187957764},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3604387044906616},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.34008508920669556},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.310752809047699},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16937944293022156},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15631729364395142}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7603181600570679},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.7126469612121582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7054783701896667},{"id":"https://openalex.org/C2776132008","wikidata":"https://www.wikidata.org/wiki/Q1509893","display_name":"Keystream","level":4,"score":0.6716430187225342},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5382039546966553},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4922098219394684},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.42516887187957764},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3604387044906616},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34008508920669556},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.310752809047699},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16937944293022156},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15631729364395142}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-023-00188-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00188-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00188-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:952c8a2eb9814c9baa21cd14b9ca8858","is_oa":true,"landing_page_url":"https://doaj.org/article/952c8a2eb9814c9baa21cd14b9ca8858","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-11 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00188-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00188-3","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00188-3","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3210377478","display_name":null,"funder_award_id":"62132008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5242007575","display_name":null,"funder_award_id":"62372213","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5870270166","display_name":null,"funder_award_id":"2132008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6278447401","display_name":null,"funder_award_id":"2022036","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8320509499","display_name":null,"funder_award_id":"62022036","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4387455694.pdf"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1554090281","https://openalex.org/W1565205193","https://openalex.org/W1822563368","https://openalex.org/W1832141711","https://openalex.org/W1901278359","https://openalex.org/W2006824395","https://openalex.org/W2012646342","https://openalex.org/W2080709494","https://openalex.org/W2109394932","https://openalex.org/W2130943734","https://openalex.org/W2160494425","https://openalex.org/W2170489924","https://openalex.org/W2185381909","https://openalex.org/W2294631369","https://openalex.org/W2402108048","https://openalex.org/W2477309039","https://openalex.org/W2497610130","https://openalex.org/W2603513604","https://openalex.org/W2605279000","https://openalex.org/W2767998798","https://openalex.org/W2794355405","https://openalex.org/W2794569840","https://openalex.org/W2810564382","https://openalex.org/W2900583946","https://openalex.org/W2901660973","https://openalex.org/W2950052038","https://openalex.org/W3006362553","https://openalex.org/W4251449190","https://openalex.org/W4281746919","https://openalex.org/W4281833962","https://openalex.org/W4311870391"],"related_works":["https://openalex.org/W2163846246","https://openalex.org/W2103272980","https://openalex.org/W2950325680","https://openalex.org/W2130959496","https://openalex.org/W3001214808","https://openalex.org/W2614608824","https://openalex.org/W1901549827","https://openalex.org/W3029464614","https://openalex.org/W1583325060","https://openalex.org/W2062048638"],"abstract_inverted_index":{"Abstract":[0],"Small-state":[1],"stream":[2],"ciphers":[3,34],"(SSCs),":[4],"which":[5,95,277],"violate":[6],"the":[7,10,15,52,62,68,74,79,98,103,111,116,122,128,134,153,252,286],"principle":[8],"that":[9,93],"state":[11],"size":[12,17],"should":[13],"exceed":[14],"key":[16,81,99,118,123,165,218,246,254],"by":[18],"a":[19,30,88,163,210,261],"factor":[20],"of":[21,64,175,220,266],"two,":[22],"still":[23],"demonstrate":[24],"robust":[25],"security":[26,44,63,284],"properties":[27],"while":[28],"maintaining":[29],"lightweight":[31],"design.":[32],"These":[33],"can":[35,100,166],"be":[36,167],"classified":[37],"into":[38],"several":[39],"constructions":[40,66],"and":[41,78,150,172,194,263],"their":[42],"basic":[43],"requirement":[45],"is":[46,91,125,137,207,242,249],"to":[47,148,251],"resist":[48,102],"generic":[49,146],"attacks,":[50],"i.e.,":[51],"time\u2013memory\u2013data":[53],"tradeoff":[54],"(TMDTO)":[55],"attack.":[56,106,256],"In":[57],"this":[58],"paper,":[59],"we":[60,142],"investigate":[61],"small-state":[65],"in":[67,152,285],"multi-user":[69,154,287],"setting.":[70,89,155,288],"Based":[71],"on":[72,110,160,213],"it,":[73],"TMDTO":[75,80,104,117,157,253],"distinguishing":[76,105,158],"attack":[77,83,120,159,206,259],"recovery":[82,119,255],"are":[84,222],"developed":[85],"for":[86],"such":[87],"It":[90],"shown":[92],"SSCs":[94,108],"continuously":[96],"use":[97],"not":[101,281],"Moreover,":[107],"based":[109],"continuous-IV-key-use":[112],"construction":[113],"cannot":[114],"withstand":[115],"when":[121],"length":[124,136,241],"shorter":[126],"than":[127,226,244],"IV":[129,240],"length,":[130,247],"no":[131],"matter":[132],"whether":[133],"keystream":[135],"limited":[138],"or":[139],"not.":[140],"Finally,":[141],"apply":[143],"these":[144],"two":[145],"attacks":[147],"TinyJAMBU":[149,161,221],"DRACO":[151,279],"The":[156,257],"with":[162,169,209,224],"128-bit":[164,283],"mounted":[168],"time,":[170],"memory,":[171],"data":[173],"complexities":[174],"$$2^{64}$$":[176],"<mml:math":[177,186,196,228,269],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[178,187,197,229,270],"<mml:msup>":[179,188,198,230,271],"<mml:mn>2</mml:mn>":[180,189,199,231,272],"<mml:mn>64</mml:mn>":[181],"</mml:msup>":[182,191,201,233,274],"</mml:math>":[183,192,202,234,275],",":[184,193,203,276],"$$2^{48}$$":[185],"<mml:mn>48</mml:mn>":[190],"$$2^{32}$$":[195],"<mml:mn>32</mml:mn>":[200],"respectively.":[204],"This":[205],"comparable":[208],"recent":[211],"work":[212],"ToSC":[214],"2022,":[215],"where":[216],"partial":[217],"bits":[219],"recovered":[223],"more":[225],"$$2^{50}$$":[227],"<mml:mn>50</mml:mn>":[232],"users":[235],"(or":[236],"keys).":[237],"As":[238],"DRACO\u2019s":[239],"smaller":[243],"its":[245],"it":[248],"vulnerable":[250],"resulting":[258],"has":[260],"time":[262],"memory":[264],"complexity":[265],"both":[267],"$$2^{112}$$":[268],"<mml:mn>112</mml:mn>":[273],"means":[278],"does":[280],"provide":[282]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
