{"id":"https://openalex.org/W7129084048","doi":"https://doi.org/10.1186/s42400-026-00556-9","title":"BONC: a framework for automatic cryptanalysis using the implementation code","display_name":"BONC: a framework for automatic cryptanalysis using the implementation code","publication_year":2026,"publication_date":"2026-02-16","ids":{"openalex":"https://openalex.org/W7129084048","doi":"https://doi.org/10.1186/s42400-026-00556-9"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-026-00556-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00556-9","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00556-9.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00556-9.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126131552","display_name":"Yu Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Gu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, No.1 Yanqihu East Rd, Huairou District, Beijing, 101408, People\u2019s Republic of China","State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, No.19 Shucun Rd, Haidian District, Beijing, 100085, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, No.1 Yanqihu East Rd, Huairou District, Beijing, 101408, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, No.19 Shucun Rd, Haidian District, Beijing, 100085, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126099398","display_name":"Meicheng Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meicheng Liu","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, No.1 Yanqihu East Rd, Huairou District, Beijing, 101408, People\u2019s Republic of China","State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, No.19 Shucun Rd, Haidian District, Beijing, 100085, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, No.1 Yanqihu East Rd, Huairou District, Beijing, 101408, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, No.19 Shucun Rd, Haidian District, Beijing, 100085, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5126099398"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38051437,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.004999999888241291,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.004100000020116568,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5774000287055969},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.5372999906539917},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5291000008583069},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.46889999508857727},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.4302000105381012},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42160001397132874},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.4171999990940094},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.38999998569488525}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8337000012397766},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5774000287055969},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.5372999906539917},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5291000008583069},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.46889999508857727},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4672999978065491},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4668999910354614},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.4302000105381012},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42160001397132874},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.4171999990940094},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.38999998569488525},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.36559998989105225},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.36079999804496765},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.3601999878883362},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.3407999873161316},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.32760000228881836},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.31610000133514404},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30160000920295715},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2827000021934509},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.27459999918937683},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.2736999988555908},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.26750001311302185},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.2660999894142151},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.2628999948501587},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2524999976158142}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-026-00556-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00556-9","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00556-9.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:63ee197ccb034c11bda055e42428a348","is_oa":true,"landing_page_url":"https://doaj.org/article/63ee197ccb034c11bda055e42428a348","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-026-00556-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-026-00556-9","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-026-00556-9.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6620004773139954,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1101513701","display_name":null,"funder_award_id":"2024YFA1013000","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3321935324","display_name":null,"funder_award_id":"62122085","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4039563609","display_name":null,"funder_award_id":"XDB06","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G6328393359","display_name":null,"funder_award_id":"12231015","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335892","display_name":"Youth Innovation Promotion Association","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W7129084048.pdf"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W380217570","https://openalex.org/W1605798759","https://openalex.org/W1883151075","https://openalex.org/W2062873592","https://openalex.org/W2100609826","https://openalex.org/W2160494425","https://openalex.org/W2166473670","https://openalex.org/W2549714595","https://openalex.org/W2740224987","https://openalex.org/W3048287511","https://openalex.org/W4246166885","https://openalex.org/W4388096424","https://openalex.org/W4390605506","https://openalex.org/W4391920120"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1],"security":[2,38,214],"analysis":[3,31,174],"of":[4,39,73,80,105,121,125,143,153,215],"symmetric":[5,42,221],"ciphers":[6],"is":[7],"a":[8,28,77,88,103,135,157,205],"time-consuming":[9],"and":[10,19,52,62,83,108,137,156,188,207,218],"labor-intensive":[11],"process":[12,115],"that":[13,90,114],"traditionally":[14],"relies":[15],"on":[16,162],"manual":[17],"derivation":[18],"mathematical":[20],"modeling":[21],"for":[22,200,210],"specific":[23],"algorithms.":[24],"This":[25,194],"paper":[26],"introduces":[27],"fully":[29],"automated":[30,173],"software":[32],"framework":[33],"designed":[34,220],"to":[35,68,94,118,176],"evaluate":[36],"the":[37,58,63,100,130,180,198,213],"any":[40],"round-based":[41],"cipher":[43],"constructed":[44],"from":[45,179],"common":[46],"primitives":[47],"like":[48],"S-boxes,":[49],"bit":[50],"permutations,":[51],"XOR":[53],"operations.":[54],"Our":[55],"approach":[56],"leverages":[57],"LLVM":[59],"compiler":[60],"infrastructure":[61],"KLEE":[64],"symbolic":[65],"execution":[66],"engine":[67],"automatically":[69,211],"convert":[70],"C":[71],"implementations":[72],"cryptographic":[74,201],"algorithms":[75],"into":[76,102],"structured":[78],"representation":[79],"state":[81],"bits":[82],"update":[84],"functions.":[85],"By":[86],"employing":[87],"frontend":[89],"uses":[91],"custom":[92],"annotations":[93],"identify":[95],"round":[96],"functions,":[97],"it":[98],"translates":[99],"algorithm":[101],"series":[104],"Bit":[106],"Expressions,":[107],"we":[109,170],"introduce":[110],"multiple":[111],"modular":[112],"backends":[113],"those":[116],"Expressions":[117],"applicable":[119],"form":[120],"performing":[122],"various":[123],"types":[124],"analyzing":[126],"methods.":[127],"We":[128],"demonstrate":[129],"tool\u2019s":[131],"effectiveness":[132],"by":[133,203],"implementing":[134],"differential":[136],"linear":[138],"cryptanalysis":[139,149],"backend":[140,150,160],"with":[141,151],"help":[142,152],"SAT":[144],"solver,":[145,155],"Division":[146],"Property":[147],"integral":[148],"MILP":[154],"degree":[158],"estimation":[159],"based":[161],"Numeric":[163],"Mapping":[164],"method.":[165],"As":[166],"an":[167],"experimental":[168],"result,":[169],"apply":[171],"these":[172],"techniques":[175],"several":[177],"finalists":[178],"NIST":[181],"Lightweight":[182],"Cryptography":[183],"(LWC)":[184],"competition,":[185],"successfully":[186],"reproducing":[187],"improving":[189],"some":[190],"existing":[191,217],"cryptanalytic":[192],"results.":[193],"work":[195],"significantly":[196],"lowers":[197],"barrier":[199],"research":[202],"providing":[204],"powerful":[206],"adaptable":[208],"platform":[209],"assessing":[212],"both":[216],"newly":[219],"ciphers.":[222]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2026-02-17T00:00:00"}
