{"id":"https://openalex.org/W2890054704","doi":"https://doi.org/10.13154/tosc.v2018.i3.265-289","title":"Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials","display_name":"Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials","publication_year":2018,"publication_date":"2018-09-04","ids":{"openalex":"https://openalex.org/W2890054704","doi":"https://doi.org/10.13154/tosc.v2018.i3.265-289","mag":"2890054704"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:0749343eea4f4f8298f8ed95af01e309","is_oa":true,"landing_page_url":"https://doaj.org/article/0749343eea4f4f8298f8ed95af01e309","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 3 (2018)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/0749343eea4f4f8298f8ed95af01e309","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077381087","display_name":"Mathias Hall-Andersen","orcid":"https://orcid.org/0000-0002-0195-6659"},"institutions":[{"id":"https://openalex.org/I4210116091","display_name":"Department of Physics, Mathematics and Informatics","ror":"https://ror.org/023sm4k53","country_code":"BY","type":"facility","lineage":["https://openalex.org/I151823869","https://openalex.org/I4210116091"]}],"countries":["BY"],"is_corresponding":false,"raw_author_name":"Hall-Andersen, Mathias","raw_affiliation_strings":["K\u00f8benhavns Universitet, Faculty of Science, Department of Computer Science, Department of Computer Science, DK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"K\u00f8benhavns Universitet, Faculty of Science, Department of Computer Science, Department of Computer Science, DK","institution_ids":["https://openalex.org/I4210116091"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086014867","display_name":"Philip S. Vejre","orcid":null},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Vejre, Philip S.","raw_affiliation_strings":["Technical University of Denmark, Department of Applied Mathematics and Computer Science, DK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Denmark, Department of Applied Mathematics and Computer Science, DK","institution_ids":["https://openalex.org/I96673099"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5086014867"],"corresponding_institution_ids":["https://openalex.org/I96673099"],"apc_list":null,"apc_paid":null,"fwci":0.1662,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.45625938,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.5503000020980835,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.5503000020980835,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/approximations-of-\u03c0","display_name":"Approximations of \u03c0","score":0.7237865328788757},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.6631913185119629},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5727062225341797},{"id":"https://openalex.org/keywords/linear-approximation","display_name":"Linear approximation","score":0.48345527052879333},{"id":"https://openalex.org/keywords/applied-mathematics","display_name":"Applied mathematics","score":0.45221957564353943},{"id":"https://openalex.org/keywords/econometrics","display_name":"Econometrics","score":0.39839479327201843},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.35492223501205444},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.19566699862480164},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.19331759214401245},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07421329617500305}],"concepts":[{"id":"https://openalex.org/C193386753","wikidata":"https://www.wikidata.org/wiki/Q1130396","display_name":"Approximations of \u03c0","level":2,"score":0.7237865328788757},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.6631913185119629},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5727062225341797},{"id":"https://openalex.org/C160824197","wikidata":"https://www.wikidata.org/wiki/Q2071054","display_name":"Linear approximation","level":3,"score":0.48345527052879333},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.45221957564353943},{"id":"https://openalex.org/C149782125","wikidata":"https://www.wikidata.org/wiki/Q160039","display_name":"Econometrics","level":1,"score":0.39839479327201843},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.35492223501205444},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.19566699862480164},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.19331759214401245},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07421329617500305},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"pmh:oai:doaj.org/article:0749343eea4f4f8298f8ed95af01e309","is_oa":true,"landing_page_url":"https://doaj.org/article/0749343eea4f4f8298f8ed95af01e309","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 3 (2018)","raw_type":"article"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/7ccfdd6c-283a-4027-8959-816d73fdad9b","is_oa":true,"landing_page_url":"https://curis.ku.dk/portal/da/publications/generating-graphs-packed-with-paths(7ccfdd6c-283a-4027-8959-816d73fdad9b).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306401983","display_name":"Research at the University of Copenhagen (University of Copenhagen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I124055696","host_organization_name":"University of Copenhagen","host_organization_lineage":["https://openalex.org/I124055696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:pure.atira.dk:publications/7ccfdd6c-283a-4027-8959-816d73fdad9b","is_oa":true,"landing_page_url":"https://researchprofiles.ku.dk/da/publications/7ccfdd6c-283a-4027-8959-816d73fdad9b","pdf_url":null,"source":{"id":"https://openalex.org/S4306401983","display_name":"Research at the University of Copenhagen (University of Copenhagen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I124055696","host_organization_name":"University of Copenhagen","host_organization_lineage":["https://openalex.org/I124055696"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hall-Andersen , M & Vejre , P S 2018 , ' Generating graphs packed with paths : Estimation of linear approximations and differentials ' , IACR Transactions on Symmetric Cryptology , vol. 2018 , no. 3 , pp. 265-289 . https://doi.org/10.13154/tosc.v2018.i3.265-289","raw_type":"article"},{"id":"doi:10.13154/tosc.v2018.i3.265-289","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tosc.v2018.i3.265-289","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:0749343eea4f4f8298f8ed95af01e309","is_oa":true,"landing_page_url":"https://doaj.org/article/0749343eea4f4f8298f8ed95af01e309","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 3 (2018)","raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2576994247","https://openalex.org/W2608353378","https://openalex.org/W4249206767","https://openalex.org/W1966829720","https://openalex.org/W46208116","https://openalex.org/W2013707007","https://openalex.org/W2064780056","https://openalex.org/W170069669","https://openalex.org/W1994648914","https://openalex.org/W2985787798"],"abstract_inverted_index":{"When":[0],"designing":[1],"a":[2,33,75,111,125,146,174,186,216],"new":[3,147,233],"symmetric-key":[4],"primitive,":[5],"the":[6,49,59,63,65,72,137,158,166,202,210,225],"designer":[7],"must":[8],"show":[9,200],"resistance":[10,36,127],"to":[11,29,37,45,86,105,128,184,207,227],"known":[12],"attacks.":[13,222],"Perhaps":[14],"most":[15,42],"prominent":[16],"amongst":[17],"these":[18,38],"are":[19],"linear":[20,50,76,90,129,150,217,221],"and":[21,40,52,91,96,130,151,163,231,234],"differential":[22,53,78,92,115,131,152],"cryptanalysis.":[23],"However,":[24],"it":[25],"is":[26,67],"notoriously":[27],"difficult":[28],"accurately":[30,70],"demonstrate":[31,178],"e.g.":[32,94],"block":[34],"cipher\u2019s":[35,126],"attacks,":[39,132],"thus":[41],"designers":[43],"resort":[44],"deriving":[46],"bounds":[47],"on":[48,237],"correlations":[51],"probabilities":[54],"of":[55,62,74,110,124,160,168,190,215,239],"their":[56],"design.":[57],"On":[58],"other":[60],"side":[61],"spectrum,":[64],"cryptanalyst":[66],"interested":[68],"in":[69,121],"assessing":[71],"strength":[73],"or":[77,114,196],"attack.":[79],"While":[80],"several":[81,238],"tools":[82],"have":[83],"been":[84],"developed":[85],"search":[87],"for":[88,135,139,149,193],"optimal":[89],"trails,":[93],"MILP":[95],"SAT":[97],"based":[98],"methods,":[99],"only":[100],"few":[101],"approaches":[102],"specifically":[103],"try":[104],"find":[106,185],"as":[107,116,133,165],"many":[108,170],"trails":[109,192],"single":[112],"approximation":[113,195],"possible.":[117],"This":[118],"can":[119,204],"result":[120],"an":[122],"overestimate":[123],"was":[134],"example":[136],"case":[138],"PRESENT.":[140],"In":[141],"this":[142,180],"work,":[143],"we":[144,199],"present":[145,232],"algorithm":[148,156,203,226],"trail":[153],"search.":[154],"The":[155],"represents":[157],"problem":[159,167],"estimating":[161],"approximations":[162],"differentials":[164],"finding":[169],"long":[171],"paths":[172],"through":[173],"multistage":[175],"graph.":[176],"We":[177,223],"that":[179],"approach":[181],"allows":[182],"us":[183],"very":[187],"large":[188],"number":[189],"good":[191],"each":[194],"differential.":[197],"Moreover,":[198],"how":[201],"be":[205],"used":[206],"efficiently":[208],"estimate":[209],"key":[211],"dependent":[212],"correlation":[213],"distribution":[214],"approximation,":[218],"facilitating":[219],"advanced":[220],"apply":[224],"17":[228],"different":[229],"ciphers,":[230],"improved":[235],"results":[236],"these.":[240]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2018-09-27T00:00:00"}
