{"id":"https://openalex.org/W7122624506","doi":"https://doi.org/10.1186/s42400-025-00540-9","title":"Improved search models of boomerang distinguishers and application to LILLIPUT","display_name":"Improved search models of boomerang distinguishers and application to LILLIPUT","publication_year":2026,"publication_date":"2026-01-12","ids":{"openalex":"https://openalex.org/W7122624506","doi":"https://doi.org/10.1186/s42400-025-00540-9"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00540-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00540-9","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00540-9.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00540-9.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122805107","display_name":"Yunong Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunong Wu","raw_affiliation_strings":["PLA Information Engineering University, Zheng Zhou, 450000, China"],"affiliations":[{"raw_affiliation_string":"PLA Information Engineering University, Zheng Zhou, 450000, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122818296","display_name":"Yanyan Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I75955062","display_name":"Henan Normal University","ror":"https://ror.org/00s13br28","country_code":"CN","type":"education","lineage":["https://openalex.org/I75955062"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanyan Zhou","raw_affiliation_strings":["College of Computer and Information Engineering, Henan Normal University, Xinxiang, 453007, China","Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang, 453007, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Henan Normal University, Xinxiang, 453007, China","institution_ids":["https://openalex.org/I75955062"]},{"raw_affiliation_string":"Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang, 453007, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122842974","display_name":"Zongsheng Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zongsheng Zhang","raw_affiliation_strings":["PLA Information Engineering University, Zheng Zhou, 450000, China"],"affiliations":[{"raw_affiliation_string":"PLA Information Engineering University, Zheng Zhou, 450000, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101382213","display_name":"Tairong Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tairong Shi","raw_affiliation_strings":["PLA Information Engineering University, Zheng Zhou, 450000, China"],"affiliations":[{"raw_affiliation_string":"PLA Information Engineering University, Zheng Zhou, 450000, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122785952","display_name":"Bin Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Hu","raw_affiliation_strings":["PLA Information Engineering University, Zheng Zhou, 450000, China"],"affiliations":[{"raw_affiliation_string":"PLA Information Engineering University, Zheng Zhou, 450000, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122808163","display_name":"Kai Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Zhang","raw_affiliation_strings":["PLA Information Engineering University, Zheng Zhou, 450000, China"],"affiliations":[{"raw_affiliation_string":"PLA Information Engineering University, Zheng Zhou, 450000, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":null,"display_name":"Senpeng Wang","orcid":"https://orcid.org/0000-0002-2306-3720"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Senpeng Wang","raw_affiliation_strings":["PLA Information Engineering University, Zheng Zhou, 450000, China"],"affiliations":[{"raw_affiliation_string":"PLA Information Engineering University, Zheng Zhou, 450000, China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07381344,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9599999785423279,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9599999785423279,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.009399999864399433,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.006099999882280827,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7458000183105469},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.5482000112533569},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.492900013923645},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4546999931335449},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.376800000667572},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.3206000030040741}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7458000183105469},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6646999716758728},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.5482000112533569},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.492900013923645},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4546999931335449},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37720000743865967},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.376800000667572},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.3206000030040741},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3109999895095825},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.30809998512268066},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29580000042915344},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.29100000858306885},{"id":"https://openalex.org/C125583679","wikidata":"https://www.wikidata.org/wiki/Q755673","display_name":"Search algorithm","level":2,"score":0.27880001068115234},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.2703000009059906},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2540000081062317}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00540-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00540-9","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00540-9.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d50a08277ca0498ebe1378e997bfb71c","is_oa":true,"landing_page_url":"https://doaj.org/article/d50a08277ca0498ebe1378e997bfb71c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-14 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00540-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00540-9","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00540-9.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1040395047","display_name":null,"funder_award_id":"62102448, 62202493","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1091139498","display_name":null,"funder_award_id":"62102448","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3941928261","display_name":null,"funder_award_id":"62202493","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7122624506.pdf","grobid_xml":"https://content.openalex.org/works/W7122624506.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W52191336","https://openalex.org/W1540066842","https://openalex.org/W1563341929","https://openalex.org/W1629301835","https://openalex.org/W1870015754","https://openalex.org/W2145038746","https://openalex.org/W2413890865","https://openalex.org/W2584778576","https://openalex.org/W2766408490","https://openalex.org/W2795355075","https://openalex.org/W2808609009","https://openalex.org/W3088488979","https://openalex.org/W3095375142","https://openalex.org/W3110785930","https://openalex.org/W4295067147","https://openalex.org/W4411095475"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Boomerang":[1],"attack":[2,186],"serves":[3],"as":[4],"a":[5,60,97,150,172,209],"potent":[6],"cryptanalytic":[7],"tool":[8],"for":[9,25,31,47,62,71,100,106,166,182,234,262,280],"assessing":[10],"the":[11,17,55,76,82,94,115,118,128,137,178,203,227,241,248,263,274,277],"security":[12,152,249,278],"of":[13,65,117,130,211,243,250,267,276],"block":[14,32,107,139,251,269],"ciphers.":[15,252],"Over":[16],"past":[18],"few":[19],"years,":[20],"various":[21],"automatic":[22],"search":[23,45,69,98],"models":[24,46,245],"boomerang":[26,52,73,102,119,155,164,175,206],"distinguishers":[27,74,165,233],"have":[28],"been":[29],"proposed":[30,105],"ciphers":[33,108],"with":[34,109,208],"different":[35],"structures.":[36],"This":[37,253],"paper":[38],"presents":[39],"improved":[40],"Mixed-Integer":[41],"Linear":[42],"Programming":[43],"(MILP)-based":[44],"both":[48],"single-key":[49,56,72,163,184],"and":[50,171,202,260,265],"related-key":[51,95,101,174,205],"distinguishers.":[53],"In":[54,93],"scenario,":[57,96],"we":[58,133,160],"propose":[59],"method":[61],"dynamic":[63],"allocation":[64],"active":[66],"S-boxes.":[67],"Our":[68],"model":[70,99],"characterizes":[75],"distinguisher":[77,103,207,229],"probability":[78,116,210],"more":[79],"accurately,":[80],"addressing":[81],"suboptimality":[83],"issue":[84],"caused":[85],"by":[86,189],"non-fixed":[87],"weight":[88],"assignments":[89],"in":[90,246],"prior":[91],"models.":[92],"is":[104,121,187,225],"bit-level":[110],"key":[111],"schedule":[112],"algorithms,":[113],"where":[114],"switch":[120],"ensured":[122],"to":[123,136,168],"be":[124],"1.":[125],"To":[126],"validate":[127],"effectiveness":[129],"our":[131,158,244],"models,":[132,159],"apply":[134],"them":[135],"lightweight":[138,268],"cipher":[140],"LILLIPUT":[141],"based":[142],"on":[143],"Extended":[144],"Generalized":[145],"Feistel":[146],"Networks":[147],"(EGFN),":[148],"conducting":[149],"comprehensive":[151],"analysis":[153,266],"against":[154],"attacks.":[156],"Using":[157],"successfully":[161],"derive":[162],"8":[167],"13":[169],"rounds":[170],"15-round":[173,204],"distinguisher.":[176],"Notably,":[177],"data":[179],"complexity":[180],"required":[181],"13-round":[183],"distinguishing":[185],"reduced":[188],"$${2^{":[190,212],"3.172}}$$":[191],"<mml:math":[192,215],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[193,216],"<mml:msup>":[194,217],"<mml:mn>2</mml:mn>":[195,218],"<mml:mrow>":[196,219],"<mml:mn>3.172</mml:mn>":[197],"</mml:mrow>":[198,222],"</mml:msup>":[199,223],"</mml:math>":[200,224],",":[201],"-":[213],"58}}$$":[214],"<mml:mo>-</mml:mo>":[220],"<mml:mn>58</mml:mn>":[221],"currently":[226],"longest-round":[228],"among":[230],"all":[231],"known":[232],"LILLIPUT.":[235,281],"The":[236],"application":[237],"results":[238],"fully":[239],"demonstrate":[240],"capability":[242],"evaluating":[247],"research":[254],"not":[255],"only":[256],"provides":[257],"new":[258],"insights":[259],"methods":[261],"design":[264],"ciphers,":[270],"but":[271],"also":[272],"deepens":[273],"understanding":[275],"characteristics":[279]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2026-01-13T00:00:00"}
