{"id":"https://openalex.org/W2794675751","doi":"https://doi.org/10.13154/tosc.v2018.i1.101-125","title":"Multivariate Profiling of Hulls for Linear Cryptanalysis","display_name":"Multivariate Profiling of Hulls for Linear Cryptanalysis","publication_year":2018,"publication_date":"2018-03-01","ids":{"openalex":"https://openalex.org/W2794675751","doi":"https://doi.org/10.13154/tosc.v2018.i1.101-125","mag":"2794675751"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:8e6703b542f0406a840d2c1c3bb14c3a","is_oa":true,"landing_page_url":"https://doaj.org/article/8e6703b542f0406a840d2c1c3bb14c3a","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 101-125 (2018)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/8e6703b542f0406a840d2c1c3bb14c3a","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046043197","display_name":"Andrey Bogdanov","orcid":"https://orcid.org/0000-0003-1449-3099"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Bogdanov, Andrey","raw_affiliation_strings":["Technical University of Denmark, Department of Applied Mathematics and Computer Science, DK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Denmark, Department of Applied Mathematics and Computer Science, DK","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070138829","display_name":"Elmar Tischhauser","orcid":"https://orcid.org/0000-0002-2031-8652"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Tischhauser, Elmar","raw_affiliation_strings":["Technical University of Denmark, Department of Applied Mathematics and Computer Science, DK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Denmark, Department of Applied Mathematics and Computer Science, DK","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086014867","display_name":"Philip S. Vejre","orcid":null},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Vejre, Philip S.","raw_affiliation_strings":["Technical University of Denmark, Department of Applied Mathematics and Computer Science, DK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Denmark, Department of Applied Mathematics and Computer Science, DK","institution_ids":["https://openalex.org/I96673099"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046043197"],"corresponding_institution_ids":["https://openalex.org/I96673099"],"apc_list":null,"apc_paid":null,"fwci":0.5301,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70334749,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.6958000063896179,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.6958000063896179,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.6636000275611877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.6031000018119812,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hull","display_name":"Hull","score":0.7177064418792725},{"id":"https://openalex.org/keywords/multivariate-statistics","display_name":"Multivariate statistics","score":0.6944811344146729},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.6593668460845947},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5214940309524536},{"id":"https://openalex.org/keywords/multivariate-analysis","display_name":"Multivariate analysis","score":0.4238136112689972},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4199501574039459},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.38292986154556274},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.352314293384552},{"id":"https://openalex.org/keywords/econometrics","display_name":"Econometrics","score":0.3260411024093628},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29751381278038025},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1863425076007843},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15753713250160217},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12178933620452881},{"id":"https://openalex.org/keywords/marine-engineering","display_name":"Marine engineering","score":0.053049325942993164}],"concepts":[{"id":"https://openalex.org/C37423430","wikidata":"https://www.wikidata.org/wiki/Q6750281","display_name":"Hull","level":2,"score":0.7177064418792725},{"id":"https://openalex.org/C161584116","wikidata":"https://www.wikidata.org/wiki/Q1952580","display_name":"Multivariate statistics","level":2,"score":0.6944811344146729},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.6593668460845947},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5214940309524536},{"id":"https://openalex.org/C38180746","wikidata":"https://www.wikidata.org/wiki/Q1952580","display_name":"Multivariate analysis","level":2,"score":0.4238136112689972},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4199501574039459},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.38292986154556274},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.352314293384552},{"id":"https://openalex.org/C149782125","wikidata":"https://www.wikidata.org/wiki/Q160039","display_name":"Econometrics","level":1,"score":0.3260411024093628},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29751381278038025},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1863425076007843},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15753713250160217},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12178933620452881},{"id":"https://openalex.org/C199104240","wikidata":"https://www.wikidata.org/wiki/Q118291","display_name":"Marine engineering","level":1,"score":0.053049325942993164}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:doaj.org/article:8e6703b542f0406a840d2c1c3bb14c3a","is_oa":true,"landing_page_url":"https://doaj.org/article/8e6703b542f0406a840d2c1c3bb14c3a","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 101-125 (2018)","raw_type":"article"},{"id":"pmh:oai:pure.atira.dk:publications/7b21b239-9b45-4361-8cc9-1e1d10fb0cd2","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/7b21b239-9b45-4361-8cc9-1e1d10fb0cd2","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bogdanov , A , Tischhauser , E W &amp; Vejre , P S 2018 , ' Multivariate profiling of hulls for linear cryptanalysis ' , IACR Transactions on Symmetric Cryptology , vol. 2018 , no. 1 , pp. 101-125 . https://doi.org/10.13154/tosc.v2018.i1.101-125","raw_type":"article"},{"id":"doi:10.13154/tosc.v2018.i1.101-125","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tosc.v2018.i1.101-125","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:8e6703b542f0406a840d2c1c3bb14c3a","is_oa":true,"landing_page_url":"https://doaj.org/article/8e6703b542f0406a840d2c1c3bb14c3a","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Pp 101-125 (2018)","raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2406638334","https://openalex.org/W40745829","https://openalex.org/W4318262572","https://openalex.org/W1978357124","https://openalex.org/W1578824628","https://openalex.org/W2032728545","https://openalex.org/W1570805059","https://openalex.org/W4250754046","https://openalex.org/W4243682621","https://openalex.org/W2036849593"],"abstract_inverted_index":{"Extensions":[0],"of":[1,6,49,64,96,102,152,165,192,197,205,214,220,230],"linear":[2,14,97,103,127,187],"cryptanalysis":[3,128],"making":[4],"use":[5],"multiple":[7,11,130],"approximations,":[8,104],"such":[9,34],"as":[10,35],"and":[12,37,73,99,139,155,235,247],"multidimensional":[13,115],"cryptanalysis,":[15,22],"are":[16,117],"an":[17,78,147,218,225],"important":[18],"tool":[19],"in":[20,156,174],"symmetric-key":[21],"among":[23],"others":[24],"being":[25],"responsible":[26],"for":[27,126,185,201],"the":[28,50,62,94,153,186,193,198,212,254,258],"best":[29],"known":[30],"attacks":[31],"on":[32,111,227],"ciphers":[33,173],"Serpent":[36],"present.":[38],"At":[39],"CRYPTO":[40],"2015,":[41],"Huang":[42],"et":[43],"al.":[44],"provided":[45],"a":[46,55,88,108,124,175,181,190,202],"refined":[47,56],"analysis":[48,68,164],"key-dependent":[51],"capacity":[52],"leading":[53],"to":[54,75,171,256],"key":[57,81],"equivalence":[58,95],"hypothesis,":[59,83],"however":[60],"at":[61],"cost":[63],"additional":[65],"assumptions.":[66,86],"Their":[67],"was":[69],"extended":[70],"by":[71,91,179],"Blondeau":[72],"Nyberg":[74,92],"also":[76],"cover":[77],"updated":[79],"wrong":[80],"randomization":[82],"using":[84,129,243],"similar":[85],"However,":[87],"recent":[89],"result":[90],"shows":[93],"dependence":[98,101],"statistical":[100],"which":[105,112,134,232,262],"essentially":[106],"invalidates":[107],"crucial":[109],"assumption":[110],"all":[113],"these":[114],"models":[116],"based.":[118],"In":[119],"this":[120,166,215],"paper,":[121],"we":[122,223],"develop":[123],"model":[125,145],"linearly":[131],"independent":[132],"approximations":[133],"takes":[135,263],"key-dependence":[136,264],"into":[137,265],"account":[138],"complies":[140],"with":[141,189],"Nyberg\u2019s":[142],"result.":[143],"Our":[144],"considers":[146],"arbitrary":[148],"multivariate":[149,195],"joint":[150],"distribution":[151,167,196],"correlations,":[154],"particular":[157],"avoids":[158],"any":[159],"assumptions":[160,210,246],"regarding":[161,211],"normality.":[162],"The":[163],"is":[168,233],"then":[169],"tailored":[170],"concrete":[172],"practically":[176],"feasible":[177],"way":[178],"combining":[180],"signal/noise":[182],"decomposition":[183],"approach":[184],"hulls":[188],"profiling":[191],"actual":[194],"signal":[199],"correlations":[200],"large":[203],"number":[204],"keys,":[206],"thereby":[207],"entirely":[208],"avoiding":[209],"shape":[213],"distribution.":[216],"As":[217],"application":[219],"our":[221],"model,":[222],"provide":[224],"attack":[226,255,261],"26":[228],"rounds":[229],"present":[231,257],"faster":[234],"requires":[236],"less":[237],"data":[238],"than":[239],"previous":[240],"attacks,":[241],"while":[242],"more":[244],"realistic":[245],"far":[248],"fewer":[249],"approximations.":[250],"We":[251],"successfully":[252],"extend":[253],"first":[259],"27-round":[260],"account.":[266]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
