{"id":"https://openalex.org/W4287659893","doi":"https://doi.org/10.13154/tosc.v2020.i3.152-174","title":"On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis","display_name":"On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis","publication_year":2020,"publication_date":"2020-09-29","ids":{"openalex":"https://openalex.org/W4287659893","doi":"https://doi.org/10.13154/tosc.v2020.i3.152-174"},"language":"en","primary_location":{"id":"pmh:oai:HAL:hal-03135912v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-03135912","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, 2020, 2020 (3), pp.152-174. &#x27E8;10.13154/tosc.v2020.i3.152-174&#x27E9;","raw_type":"Journal articles"},"type":"article","indexed_in":["datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://inria.hal.science/hal-03135912","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068524908","display_name":"Dhiman Saha","orcid":"https://orcid.org/0000-0001-5162-9683"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Saha, Dhiman","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science [Bhilai]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science [Bhilai]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022029799","display_name":"Yu Sasaki","orcid":null},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Sasaki, Yu","raw_affiliation_strings":["NTT Secure Platform Laboratories [Tokyo]"],"affiliations":[{"raw_affiliation_string":"NTT Secure Platform Laboratories [Tokyo]","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051143934","display_name":"Danping Shi","orcid":"https://orcid.org/0000-0003-2809-8647"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shi, Danping","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Sibleyras, Ferdinand","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sibleyras, Ferdinand","raw_affiliation_strings":["Cryptologie syme\u0301trique, cryptologie fonde\u0301e sur les codes et information quantique"],"affiliations":[{"raw_affiliation_string":"Cryptologie syme\u0301trique, cryptologie fonde\u0301e sur les codes et information quantique","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027649882","display_name":"Siwei Sun","orcid":"https://orcid.org/0000-0002-3058-2377"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sun, Siwei","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":null,"display_name":"Zhang, Yingjie","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhang, Yingjie","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5068524908"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1372,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61233451,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9616000056266785,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9616000056266785,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.02590000070631504,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.007400000002235174,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.8739283084869385},{"id":"https://openalex.org/keywords/margin","display_name":"Margin (machine learning)","score":0.6399984359741211},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.6264433264732361},{"id":"https://openalex.org/keywords/higher-order-differential-cryptanalysis","display_name":"Higher-order differential cryptanalysis","score":0.6257903575897217},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.6124920845031738},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.6029055118560791},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5604387521743774},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.5319493412971497},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.44199711084365845},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.41447943449020386},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.40029507875442505},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35399526357650757},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17711010575294495},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1690373420715332}],"concepts":[{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.8739283084869385},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.6399984359741211},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.6264433264732361},{"id":"https://openalex.org/C151607707","wikidata":"https://www.wikidata.org/wiki/Q11673206","display_name":"Higher-order differential cryptanalysis","level":5,"score":0.6257903575897217},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.6124920845031738},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.6029055118560791},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5604387521743774},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.5319493412971497},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.44199711084365845},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.41447943449020386},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.40029507875442505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35399526357650757},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17711010575294495},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1690373420715332},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:HAL:hal-03135912v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-03135912","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, 2020, 2020 (3), pp.152-174. &#x27E8;10.13154/tosc.v2020.i3.152-174&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:doaj.org/article:4c20999bb57b4dc7b4e3693020ff0fb5","is_oa":true,"landing_page_url":"https://doaj.org/article/4c20999bb57b4dc7b4e3693020ff0fb5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 3 (2020)","raw_type":"article"},{"id":"doi:10.13154/tosc.v2020.i3.152-174","is_oa":true,"landing_page_url":"https://doi.org/10.13154/tosc.v2020.i3.152-174","pdf_url":null,"source":{"id":"https://openalex.org/S7407052971","display_name":"UB Bochum","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-03135912v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-03135912","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, 2020, 2020 (3), pp.152-174. &#x27E8;10.13154/tosc.v2020.i3.152-174&#x27E9;","raw_type":"Journal articles"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2557174342","https://openalex.org/W2996824228","https://openalex.org/W4230315357","https://openalex.org/W57168481","https://openalex.org/W2800335167","https://openalex.org/W2950215720","https://openalex.org/W1410349837","https://openalex.org/W1598870173","https://openalex.org/W3123145532","https://openalex.org/W2791274315"],"abstract_inverted_index":{"This":[0,137],"paper":[1],"presents":[2],"the":[3,45,58,105,117,140,148,169,178,182,185,190,206,212],"first":[4],"third-party":[5],"security":[6,141,170,187],"analysis":[7],"of":[8,13,48,96,108,143,150,172,205],"TinyJAMBU,":[9],"which":[10],"is":[11,153,193],"one":[12],"32":[14],"second-round":[15],"candidates":[16],"in":[17,114],"NIST\u2019s":[18],"lightweight":[19],"cryptography":[20],"standardization":[21],"process.":[22],"TinyJAMBU":[23,144],"adopts":[24],"an":[25],"NLFSR":[26],"based":[27],"keyed-permutation":[28],"that":[29,91,111,128,139,208],"computes":[30],"only":[31,101],"a":[32,37,54,88,93,122,131,159],"single":[33],"NAND":[34],"gate":[35],"as":[36],"non-linear":[38],"component":[39],"per":[40],"round.":[41],"The":[42],"designers":[43],"evaluated":[44],"minimum":[46],"number":[47,149],"active":[49],"AND":[50,62,109],"gates,":[51],"however":[52,75],"such":[53,70],"counting":[55],"method":[56],"neglects":[57],"dependency":[59],"between":[60,184],"multiple":[61],"gates.":[63],"There":[64],"also":[65,157,200],"exist":[66],"previous":[67],"works":[68],"considering":[69],"dependencies":[71],"with":[72,125,145,165,175],"stricter":[73],"models,":[74],"those":[76],"are":[77],"known":[78],"to":[79,130,147,177,216],"be":[80,217],"too":[81],"slow.":[82],"In":[83],"this":[84],"paper,":[85],"we":[86,120],"present":[87],"new":[89],"model":[90],"provides":[92],"good":[94],"balance":[95],"efficiency":[97],"and":[98,189],"accuracy":[99],"by":[100],"taking":[102],"into":[103],"account":[104],"first-order":[106],"correlation":[107],"gates":[110],"frequently":[112],"occurs":[113],"TinyJAMBU.":[115],"With":[116],"refined":[118],"model,":[119],"show":[121,158],"338-round":[123],"differential":[124,160],"probability":[126,166],"2\u221262.68":[127],"leads":[129],"forgery":[132],"attack":[133,191],"breaking":[134],"64-bit":[135],"security.":[136],"implies":[138],"margin":[142,171],"respect":[146,176],"unattacked":[151],"rounds":[152,164,174],"approximately":[154],"12%.":[155],"We":[156],"on":[161],"full":[162,173],"384":[163],"2\u221270.64,":[167],"thus":[168],"data":[179],"complexity,":[180,192],"namely":[181],"gap":[183],"claimed":[186],"bits":[188],"less":[194],"than":[195],"8":[196],"bits.":[197],"Our":[198],"attacks":[199],"point":[201],"out":[202],"structural":[203],"weaknesses":[204],"mode":[207],"essentially":[209],"come":[210],"from":[211],"minimal":[213],"state":[214],"size":[215],"lightweight.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
