{"id":"https://openalex.org/W7124905476","doi":"https://doi.org/10.1186/s42400-025-00471-5","title":"Practical weak-key attack against full-round Loong: an involutional lightweight block cipher","display_name":"Practical weak-key attack against full-round Loong: an involutional lightweight block cipher","publication_year":2026,"publication_date":"2026-01-20","ids":{"openalex":"https://openalex.org/W7124905476","doi":"https://doi.org/10.1186/s42400-025-00471-5"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00471-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00471-5","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00471-5.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00471-5.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123403792","display_name":"Hao Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116924","display_name":"Chinese University of Hong Kong, Shenzhen","ror":"https://ror.org/02d5ks197","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633","https://openalex.org/I180726961","https://openalex.org/I4210116924"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Guo","raw_affiliation_strings":["School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen, Shenzhen, 518172, China"],"affiliations":[{"raw_affiliation_string":"School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen, Shenzhen, 518172, China","institution_ids":["https://openalex.org/I4210116924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014303403","display_name":"Caibing Wang","orcid":"https://orcid.org/0000-0002-3076-7240"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Caibing Wang","raw_affiliation_strings":["Department of Cryptology Science and Technology, Beijing Electronic Science and Technology Institute, Beijing, 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Cryptology Science and Technology, Beijing Electronic Science and Technology Institute, Beijing, 100070, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123398207","display_name":"Qianqian Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianqian Yang","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, 100085, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123387352","display_name":"Lei Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Hu","raw_affiliation_strings":["Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, 100085, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS, Beijing, 100085, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014303403"],"corresponding_institution_ids":["https://openalex.org/I202334528"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14029709,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.0071000000461936,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.0015999999595806003,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8373000025749207},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.6015999913215637},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5756999850273132},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.5594000220298767},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4512999951839447},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.43220001459121704},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.4171999990940094},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.382999986410141}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8373000025749207},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.6015999913215637},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5928000211715698},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5756999850273132},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.5594000220298767},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4537999927997589},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4512999951839447},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4350999891757965},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.43220001459121704},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.4171999990940094},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.382999986410141},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.36079999804496765},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3508000075817108},{"id":"https://openalex.org/C96675983","wikidata":"https://www.wikidata.org/wiki/Q7622661","display_name":"Stream cipher attack","level":4,"score":0.3492000102996826},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.31060001254081726},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.30399999022483826},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.28690001368522644},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2628999948501587},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.2615000009536743},{"id":"https://openalex.org/C2983050975","wikidata":"https://www.wikidata.org/wiki/Q88287214","display_name":"Block structure","level":3,"score":0.2500999867916107}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00471-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00471-5","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00471-5.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:957edac7fd4f4bb18ada20d8fc5c2cca","is_oa":true,"landing_page_url":"https://doaj.org/article/957edac7fd4f4bb18ada20d8fc5c2cca","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-21 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00471-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00471-5","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00471-5.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5450092554092407,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G165624230","display_name":null,"funder_award_id":"2024019","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G3747374251","display_name":null,"funder_award_id":"3282024019","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8018213797","display_name":null,"funder_award_id":"3282024048","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8951484681","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7124905476.pdf","grobid_xml":"https://content.openalex.org/works/W7124905476.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1894646615","https://openalex.org/W1964723977","https://openalex.org/W1978695162","https://openalex.org/W2293947265","https://openalex.org/W2417236067","https://openalex.org/W2741840250","https://openalex.org/W2972494639","https://openalex.org/W4241072010","https://openalex.org/W4254435982","https://openalex.org/W4289647334"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"In":[1,81],"lightweight":[2,28],"block":[3,29,230],"cipher":[4,271],"designs,":[5],"involutory":[6,44,49,55,70,102,233,263],"components":[7,17],"are":[8,129,171,244,251],"often":[9],"employed":[10],"to":[11,78,247,255],"minimize":[12],"circuit":[13,267],"area.":[14],"However,":[15],"these":[16,59],"can":[18],"also":[19,274],"introduce":[20],"security":[21,206,228,277],"vulnerabilities.":[22],"Loong":[23,41,76],"is":[24],"a":[25,53,65,214],"family":[26],"of":[27,40,72,93,100,115,120,172,207,229,262],"ciphers":[30,231],"based":[31],"on":[32,213],"the":[33,69,73,90,97,118,205,227,260],"Substitution-Permutation":[34],"Network":[35],"(SPN)":[36],"structure.":[37],"Each":[38],"round":[39,56,91,103,234,264],"incorporates":[42],"two":[43,48],"MDS":[45],"matrices":[46],"and":[47,64,127,153,191,217,250,269],"S-boxes,":[50],"resulting":[51],"in":[52,236],"fully":[54],"function.":[57],"While":[58,259],"operations":[60],"provide":[61],"high":[62],"diffusion":[63],"substantial":[66],"algebraic":[67],"degree,":[68],"nature":[71],"design":[74],"makes":[75],"vulnerable":[77,254],"weak-key":[79,107,121,169,248],"attacks.":[80],"this":[82],"paper,":[83],"we":[84,105,210,225],"present":[85],"several":[86],"notable":[87],"observations":[88],"regarding":[89],"function":[92],"Loong.":[94,116,208],"By":[95],"exploiting":[96],"unique":[98],"properties":[99],"its":[101],"function,":[104],"identify":[106],"differential":[108,122,220,257],"characteristics":[109,123,221],"for":[110,124,222],"all":[111],"three":[112],"full-round":[113],"variants":[114],"Specifically,":[117],"probabilities":[119],"Loong-64,":[125],"Loong-80,":[126],"Loong-128":[128],"$$2^{-26.83}$$":[130],"<mml:math":[131,143,155,175,184,193],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[132,144,156,176,185,194],"<mml:msup>":[133,145,157,177,186,195],"<mml:mn>2</mml:mn>":[134,146,158,178,187,196],"<mml:mrow>":[135,147,159],"<mml:mo>-</mml:mo>":[136,148,160],"<mml:mn>26.83</mml:mn>":[137],"</mml:mrow>":[138,150,162],"</mml:msup>":[139,151,163,180,189,198],"</mml:math>":[140,152,164,181,190,199],",":[141,165,182],"$$2^{-37.42}$$":[142],"<mml:mn>37.42</mml:mn>":[149],"$$2^{-46.66}$$":[154],"<mml:mn>46.66</mml:mn>":[161],"respectively.":[166],"The":[167],"corresponding":[168],"spaces":[170],"sizes":[173],"$$2^{36}$$":[174],"<mml:mn>36</mml:mn>":[179],"$$2^{52}$$":[183],"<mml:mn>52</mml:mn>":[188],"$$2^{96}$$":[192],"<mml:mn>96</mml:mn>":[197],".":[200],"These":[201],"findings":[202,239],"effectively":[203],"compromise":[204],"Furthermore,":[209],"conducted":[211],"experiments":[212],"personal":[215],"computer":[216],"identified":[218],"practical":[219],"Loong-64.":[223],"Additionally,":[224],"analyze":[226],"with":[232],"functions":[235,265],"general.":[237],"Our":[238],"indicate":[240],"that":[241],"such":[242],"designs":[243],"more":[245,253],"prone":[246],"attacks":[249],"even":[252],"general":[256],"cryptanalysis.":[258],"use":[261],"reduces":[266],"area":[268],"improves":[270],"efficiency,":[272],"it":[273],"introduces":[275],"significant":[276],"weaknesses.":[278]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2026-01-21T00:00:00"}
