{"id":"https://openalex.org/W2592815303","doi":"https://doi.org/10.13154/tosc.v2016.i2.226-247","title":"Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs","display_name":"Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs","publication_year":2017,"publication_date":"2017-02-01","ids":{"openalex":"https://openalex.org/W2592815303","doi":"https://doi.org/10.13154/tosc.v2016.i2.226-247","mag":"2592815303"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:d8ce9bbd3184484c952c6d4fbb91916c","is_oa":true,"landing_page_url":"https://doaj.org/article/d8ce9bbd3184484c952c6d4fbb91916c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 226-247 (2017)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/d8ce9bbd3184484c952c6d4fbb91916c","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072754929","display_name":"Alex Biryukov","orcid":"https://orcid.org/0000-0003-1404-6686"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Biryukov, Alex","raw_affiliation_strings":["SnT, CSC, University of Luxembourg"],"affiliations":[{"raw_affiliation_string":"SnT, CSC, University of Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059822476","display_name":"Dmitry Khovratovich","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Khovratovich, Dmitry","raw_affiliation_strings":["University of Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109364915","display_name":"L\u00e9o Paul Perrin","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Perrin, L\u00e9o","raw_affiliation_strings":["SnT - University of Luxembourg"],"affiliations":[{"raw_affiliation_string":"SnT - University of Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072754929"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":1.6612,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.87726362,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9485999941825867,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multiset","display_name":"Multiset","score":0.6739750504493713},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6207388043403625},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.6065239310264587},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.4388192594051361},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4161275625228882},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3991157114505768},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3207467198371887},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.25388649106025696},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22415828704833984}],"concepts":[{"id":"https://openalex.org/C2779623528","wikidata":"https://www.wikidata.org/wiki/Q864377","display_name":"Multiset","level":2,"score":0.6739750504493713},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6207388043403625},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.6065239310264587},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.4388192594051361},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4161275625228882},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3991157114505768},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3207467198371887},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.25388649106025696},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22415828704833984},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:doaj.org/article:d8ce9bbd3184484c952c6d4fbb91916c","is_oa":true,"landing_page_url":"https://doaj.org/article/d8ce9bbd3184484c952c6d4fbb91916c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 226-247 (2017)","raw_type":"article"},{"id":"pmh:oai:orbilu.uni.lu:10993/30023","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/30023","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, 2016(2), 226-247.  (2016).","raw_type":null},{"id":"doi:10.13154/tosc.v2016.i2.226-247","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tosc.v2016.i2.226-247","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:d8ce9bbd3184484c952c6d4fbb91916c","is_oa":true,"landing_page_url":"https://doaj.org/article/d8ce9bbd3184484c952c6d4fbb91916c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 226-247 (2017)","raw_type":"article"},"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1907974733","https://openalex.org/W2802560047","https://openalex.org/W2093538406","https://openalex.org/W2026284256","https://openalex.org/W2397489728","https://openalex.org/W2102023965","https://openalex.org/W1849484603","https://openalex.org/W1996683293","https://openalex.org/W1536590213","https://openalex.org/W2786560893"],"abstract_inverted_index":{"We":[0],"devise":[1],"the":[2,7,37,49,60,72,92,97,100],"first":[3],"closed":[4],"formula":[5],"for":[6,90],"number":[8],"of":[9,11,44,47,67,70,86],"rounds":[10,46,69],"a":[12,84],"blockcipher":[13,52],"with":[14],"secret":[15],"components":[16,20],"so":[17],"that":[18],"these":[19],"can":[21],"be":[22],"revealed":[23],"using":[24],"multiset,":[25],"algebraic-degree,":[26],"or":[27],"division-integral":[28],"properties,":[29],"which":[30,91],"in":[31],"this":[32],"case":[33],"are":[34,94,99],"equivalent.":[35],"Using":[36],"new":[38],"result,":[39],"we":[40,63,77],"attack":[41,64],"7":[42],"(out":[43,66],"9)":[45],"Kuznyechik,":[48],"recent":[50],"Russian":[51],"standard,":[53],"thus":[54],"halving":[55],"its":[56],"security":[57],"margin.":[58],"With":[59],"same":[61],"technique":[62],"6":[65],"8)":[68],"Khazad,":[71],"legacy":[73],"64-bit":[74],"blockcipher.":[75],"Finally,":[76],"show":[78],"how":[79],"to":[80,102],"cryptanalyze":[81],"and":[82],"find":[83],"decomposition":[85],"generic":[87],"SPN":[88],"construction":[89],"inner-components":[93],"secret.":[95],"All":[96],"attacks":[98],"best":[101],"date.":[103]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
