{"id":"https://openalex.org/W4289647503","doi":"https://doi.org/10.13154/tosc.v2020.i1.396-424","title":"Finding Bit-Based Division Property for Ciphers with Complex Linear Layers","display_name":"Finding Bit-Based Division Property for Ciphers with Complex Linear Layers","publication_year":2020,"publication_date":"2020-05-07","ids":{"openalex":"https://openalex.org/W4289647503","doi":"https://doi.org/10.13154/tosc.v2020.i1.396-424"},"language":"en","primary_location":{"id":"pmh:oai:doaj.org/article:1b996b8a01f142eb881519991914afa9","is_oa":true,"landing_page_url":"https://doaj.org/article/1b996b8a01f142eb881519991914afa9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)","raw_type":"article"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doaj.org/article/1b996b8a01f142eb881519991914afa9","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057094044","display_name":"Kai Hu","orcid":"https://orcid.org/0000-0003-3552-7200"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hu, Kai","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, 266237, China; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, Shandong, 266237, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, 266237, China; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, Shandong, 266237, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081824981","display_name":"Qingju Wang","orcid":"https://orcid.org/0000-0003-4565-8394"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Wang, Qingju","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability (SnT), University of Luxembourg, L-4364 Esch-sur-Alzette, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability (SnT), University of Luxembourg, L-4364 Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048972311","display_name":"Meiqin Wang","orcid":"https://orcid.org/0000-0003-1580-6544"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang, Meiqin","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, 266237, China; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, Shandong, 266237, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, 266237, China; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, Shandong, 266237, China","institution_ids":["https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057094044"],"corresponding_institution_ids":["https://openalex.org/I154099455"],"apc_list":null,"apc_paid":null,"fwci":0.3977,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.71012573,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9617000222206116,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/division","display_name":"Division (mathematics)","score":0.8015995025634766},{"id":"https://openalex.org/keywords/bit","display_name":"Bit (key)","score":0.5623241066932678},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.5258727073669434},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48767101764678955},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.4642987847328186},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3609614372253418},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34653526544570923},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3287002742290497},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15906986594200134},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.07958054542541504}],"concepts":[{"id":"https://openalex.org/C60798267","wikidata":"https://www.wikidata.org/wiki/Q1226939","display_name":"Division (mathematics)","level":2,"score":0.8015995025634766},{"id":"https://openalex.org/C117011727","wikidata":"https://www.wikidata.org/wiki/Q1278488","display_name":"Bit (key)","level":2,"score":0.5623241066932678},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.5258727073669434},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48767101764678955},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.4642987847328186},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3609614372253418},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34653526544570923},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3287002742290497},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15906986594200134},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.07958054542541504},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:doaj.org/article:1b996b8a01f142eb881519991914afa9","is_oa":true,"landing_page_url":"https://doaj.org/article/1b996b8a01f142eb881519991914afa9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)","raw_type":"article"},{"id":"pmh:oai:orbilu.uni.lu:10993/42849","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/42849","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology (1) (2020-02)","raw_type":"peer reviewed"},{"id":"doi:10.13154/tosc.v2020.i1.396-424","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tosc.v2020.i1.396-424","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:doaj.org/article:1b996b8a01f142eb881519991914afa9","is_oa":true,"landing_page_url":"https://doaj.org/article/1b996b8a01f142eb881519991914afa9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)","raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2411923897","https://openalex.org/W4381186982","https://openalex.org/W4200259850","https://openalex.org/W2333831899","https://openalex.org/W2793694171","https://openalex.org/W2484894494","https://openalex.org/W2367385042","https://openalex.org/W2506252583","https://openalex.org/W2036954759","https://openalex.org/W4238090084"],"abstract_inverted_index":{"The":[0,212],"bit-based":[1],"division":[2,104],"property":[3,119],"(BDP)":[4],"is":[5,170,254],"the":[6,25,31,42,76,107,117,121,135,148,152,163,167,191,202,235,245,255,262,265,269,302],"most":[7,26,222],"effective":[8],"technique":[9],"for":[10,41,189,238,249,279],"finding":[11],"integral":[12,290],"characteristics":[13],"of":[14,24,33,58,116,147,187,215,223,264],"symmetric":[15],"ciphers.":[16],"Recently,":[17],"automatic":[18,39],"search":[19],"tools":[20,40],"have":[21,44],"become":[22],"one":[23,94],"popular":[27],"approaches":[28],"to":[29,47,127,138,151,160,173,205,257,272,283],"evaluating":[30],"security":[32],"designs":[34],"against":[35],"many":[36,48],"attacks.":[37],"Constraint-aided":[38],"BDP":[43,237,247],"been":[45],"applied":[46],"ciphers":[49],"with":[50,143,251],"simple":[51],"linear":[52,60,82,153,158],"layers":[53,61],"like":[54,87],"bit-permutation.":[55],"Constructing":[56],"models":[57,92],"complex":[59,81],"accurately":[62],"and":[63,89,132,155,240],"efficiently":[64],"remains":[65],"hard.":[66],"A":[67],"straightforward":[68],"method":[69,99,137,169,229,267],"proposed":[70,292],"by":[71,95,221,300],"Sun":[72],"et":[73],"al.":[74],"(called":[75],"S":[77,303],"method),":[78],"decomposes":[79],"a":[80,113,184,195,206],"layer":[83],"into":[84,106],"basic":[85],"operations":[86],"COPY":[88],"XOR,":[90],"then":[91,156],"them":[93],"one.":[96],"However,":[97],"this":[98,129],"can":[100,218],"easily":[101],"insert":[102],"invalid":[103],"trails":[105],"solution":[108],"pool,":[109],"which":[110,226,253,275,296],"results":[111,248],"in":[112,178],"quicker":[114],"loss":[115],"balanced":[118],"than":[120],"cipher":[122],"itself":[123],"would.":[124],"In":[125],"order":[126],"solve":[128],"problem,":[130],"Zhang":[131],"Rijmen":[133],"propose":[134],"ZR":[136,168,266,305],"link":[139],"every":[140],"valid":[141,207],"trail":[142,208],"an":[144],"invertible":[145,164,174],"sub-matrix":[146,203],"matrix":[149,270],"corresponding":[150,204],"layer,":[154],"generate":[157],"inequalities":[159,188],"represent":[161],"all":[162,190],"sub-matrices.":[165],"Unfortunately,":[166],"only":[171,199],"applicable":[172],"binary":[175],"matrices":[176],"(defined":[177],"Definition":[179],"3).":[180],"To":[181],"avoid":[182],"generating":[183],"huge":[185],"number":[186],"sub-matrices,":[192],"we":[193,233,260,285],"build":[194],"new":[196],"model":[197,217],"that":[198,201,268],"includes":[200],"should":[209],"be":[210,219,273,298],"invertible.":[211],"computing":[213],"scale":[214],"our":[216,228],"tackled":[220],"SMT/SAT":[224],"solvers,":[225],"makes":[227],"practical.":[230],"For":[231],"applications,":[232],"improve":[234],"previous":[236],"LED":[239],"MISTY1.":[241],"We":[242],"also":[243,286],"give":[244],"7-round":[246],"Camellia":[250],"FL/FL\u22121,":[252],"longest":[256],"date.":[258],"Furthermore,":[259],"remove":[261],"restriction":[263],"has":[271],"invertible,":[274],"provides":[276],"more":[277],"choices":[278],"future":[280],"designs.":[281],"Thanks":[282],"this,":[284],"reproduce":[287],"5-round":[288],"key-dependent":[289],"distinguishers":[291],"at":[293],"Crypto":[294],"2016":[295],"cannot":[297],"obtained":[299],"either":[301],"or":[304],"methods.":[306]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
