{"id":"https://openalex.org/W2578106189","doi":"https://doi.org/10.13154/tosc.v2016.i2.288-306","title":"Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP","display_name":"Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP","publication_year":2017,"publication_date":"2017-02-01","ids":{"openalex":"https://openalex.org/W2578106189","doi":"https://doi.org/10.13154/tosc.v2016.i2.288-306","mag":"2578106189"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:c7f8e9c0c3b949ed9ccc5e82d40db8b2","is_oa":true,"landing_page_url":"https://doaj.org/article/c7f8e9c0c3b949ed9ccc5e82d40db8b2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 288-306 (2017)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/c7f8e9c0c3b949ed9ccc5e82d40db8b2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109350267","display_name":"Zhiyuan Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guo, Zhiyuan","raw_affiliation_strings":["TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878; University of Chinese Academy of Sciences, Beijing"],"affiliations":[{"raw_affiliation_string":"TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878; University of Chinese Academy of Sciences, Beijing","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I4210165038","https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wu, Wenling","raw_affiliation_strings":["TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing"],"affiliations":[{"raw_affiliation_string":"TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016210264","display_name":"Renzhang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liu, Renzhang","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100749307","display_name":"Liting Zhang","orcid":"https://orcid.org/0000-0002-3494-462X"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhang, Liting","raw_affiliation_strings":["TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5109350267"],"corresponding_institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210132990","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.5851,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74086799,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6903207898139954},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6763474941253662},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5444220304489136},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.525732159614563},{"id":"https://openalex.org/keywords/iterated-function","display_name":"Iterated function","score":0.5041717290878296},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5001974105834961},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4533899426460266},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.43688902258872986},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43445801734924316},{"id":"https://openalex.org/keywords/concrete-security","display_name":"Concrete security","score":0.4273056983947754},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.4214567244052887},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3959146738052368},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3452768921852112},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.21006551384925842},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.17189311981201172},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10048356652259827}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6903207898139954},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6763474941253662},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5444220304489136},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.525732159614563},{"id":"https://openalex.org/C140479938","wikidata":"https://www.wikidata.org/wiki/Q5254619","display_name":"Iterated function","level":2,"score":0.5041717290878296},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5001974105834961},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4533899426460266},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.43688902258872986},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43445801734924316},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.4273056983947754},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.4214567244052887},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3959146738052368},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3452768921852112},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.21006551384925842},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.17189311981201172},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10048356652259827},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:doaj.org/article:c7f8e9c0c3b949ed9ccc5e82d40db8b2","is_oa":true,"landing_page_url":"https://doaj.org/article/c7f8e9c0c3b949ed9ccc5e82d40db8b2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 288-306 (2017)","raw_type":"article"},{"id":"doi:10.13154/tosc.v2016.i2.288-306","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tosc.v2016.i2.288-306","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:c7f8e9c0c3b949ed9ccc5e82d40db8b2","is_oa":true,"landing_page_url":"https://doaj.org/article/c7f8e9c0c3b949ed9ccc5e82d40db8b2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 288-306 (2017)","raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1485429318","https://openalex.org/W1556212265","https://openalex.org/W1584768110","https://openalex.org/W1597699498","https://openalex.org/W1662746580","https://openalex.org/W1765383535","https://openalex.org/W1810232834","https://openalex.org/W1901931695","https://openalex.org/W1958084802","https://openalex.org/W2012646342","https://openalex.org/W2032777323","https://openalex.org/W2064939672","https://openalex.org/W2104071065","https://openalex.org/W2139172211","https://openalex.org/W2141096463","https://openalex.org/W2163466490","https://openalex.org/W2204642948","https://openalex.org/W2208284559","https://openalex.org/W2290117735","https://openalex.org/W2295349647","https://openalex.org/W2408512050","https://openalex.org/W2625365318","https://openalex.org/W2727655671","https://openalex.org/W3021007144","https://openalex.org/W3030624396"],"related_works":["https://openalex.org/W2358138126","https://openalex.org/W2348979250","https://openalex.org/W3170017104","https://openalex.org/W1992525896","https://openalex.org/W2955579865","https://openalex.org/W3154296659","https://openalex.org/W2163370018","https://openalex.org/W3121535427","https://openalex.org/W3113945533","https://openalex.org/W3132724916"],"abstract_inverted_index":{"The":[0],"tweakable":[1,34,60],"Even-Mansour":[2,7,61],"construction":[3],"generalizes":[4],"the":[5,43,48,55,111,117,143,156,173,216,223,234,243,251,269,280],"conventional":[6],"scheme":[8],"through":[9],"replacing":[10],"round":[11],"keys":[12],"by":[13,116,197],"strings":[14],"derived":[15],"from":[16,37,71,85],"a":[17,21,30,33,72,78,104,129,138],"master":[18],"key":[19,202],"and":[20,77,135,166,182,203,213,248,287],"tweak.":[22],"Besides":[23],"providing":[24],"plenty":[25],"of":[26,51,54,119,132,164,218,246],"inherent":[27],"variability,":[28],"such":[29],"design":[31],"builds":[32],"block":[35],"cipher":[36],"some":[38,86],"lower":[39],"level":[40],"primitive.":[41],"In":[42],"present":[44],"paper,":[45],"we":[46,102,127,150,221],"evaluate":[47],"multi-key":[49,106,140,174],"security":[50,244,266],"TEM-1,":[52],"one":[53],"most":[56],"commonly":[57],"used":[58],"one-round":[59],"schemes":[62],"(formally":[63],"introduced":[64],"at":[65,124,169],"CRYPTO":[66],"2015),":[67],"which":[68,187],"is":[69,279],"constructed":[70],"single":[73],"n-bit":[74],"permutation":[75],"P":[76],"function":[79],"f(k,":[80],"t)":[81],"linear":[82],"in":[83,98,110,142,172,250,268],"k":[84],"tweak":[87],"space":[88],"to":[89,154,190,228,259],"{0,":[90],"1}":[91],"n.":[92],"Based":[93],"on":[94,108,180,285],"giant":[95],"component":[96],"theorem":[97],"random":[99],"graph":[100],"theory,":[101],"propose":[103],"collision-based":[105],"attack":[107,141,227],"TEM-1":[109],"known-plaintext":[112],"setting.":[113,146,175,236],"Furthermore,":[114],"inspired":[115],"methodology":[118],"Fouque":[120],"et":[121],"al.":[122],"presented":[123],"ASIACRYPT":[125],"2014,":[126],"devise":[128],"novel":[130],"way":[131],"detecting":[133],"collisions":[134],"eventually":[136],"obtain":[137],"memory-efficient":[139],"adaptive":[144],"chosen-plaintext":[145,226],"As":[147],"important":[148],"applications,":[149],"utilize":[151],"our":[152,238,262],"techniques":[153],"analyze":[155],"authenticated":[157],"encryption":[158],"algorithms":[159],"Minalpher":[160,181,247,286],"(a":[161],"second-round":[162],"candidate":[163],"CAESAR)":[165],"OPP":[167,183,249],"(proposed":[168],"EUROCRYPT":[170],"2016)":[171],"We":[176,276],"describe":[177],"knownplaintext":[178],"attacks":[179,239],"without":[184],"nonce":[185],"misuse,":[186],"enable":[188],"us":[189],"recover":[191],"almost":[192],"all":[193],"O(2n/3)":[194,199],"independent":[195],"masks":[196],"making":[198],"queries":[200],"per":[201],"costing":[204],"O(22n/3)":[205],"memory":[206],"overall.":[207],"After":[208],"defining":[209],"appropriate":[210],"iterated":[211],"functions":[212],"accordingly":[214],"changing":[215],"mode":[217],"creating":[219],"chains,":[220],"improve":[222],"basic":[224],"blockwiseadaptive":[225],"make":[229],"it":[230],"also":[231],"applicable":[232],"for":[233],"nonce-respecting":[235],"While":[237],"do":[240],"not":[241],"contradict":[242],"proofs":[245],"classical":[252],"setting,":[253],"nor":[254],"pose":[255],"an":[256],"immediate":[257],"threat":[258],"their":[260,265],"uses,":[261],"results":[263],"demonstrate":[264],"margins":[267],"multi-user":[270],"setting":[271],"should":[272],"be":[273],"carefully":[274],"considered.":[275],"emphasize":[277],"this":[278],"very":[281],"first":[282],"third-party":[283],"analysis":[284],"OPP.":[288]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
