{"id":"https://openalex.org/W2997620379","doi":"https://doi.org/10.1587/transfun.2019cil0004","title":"Security of Related-Key Differential Attacks on TWINE, Revisited","display_name":"Security of Related-Key Differential Attacks on TWINE, Revisited","publication_year":2019,"publication_date":"2019-12-31","ids":{"openalex":"https://openalex.org/W2997620379","doi":"https://doi.org/10.1587/transfun.2019cil0004","mag":"2997620379"},"language":"en","primary_location":{"id":"doi:10.1587/transfun.2019cil0004","is_oa":false,"landing_page_url":"https://doi.org/10.1587/transfun.2019cil0004","pdf_url":null,"source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008561889","display_name":"Kosei Sakamoto","orcid":null},"institutions":[{"id":"https://openalex.org/I180941496","display_name":"University of Hyogo","ror":"https://ror.org/0151bmh98","country_code":"JP","type":"education","lineage":["https://openalex.org/I180941496"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kosei SAKAMOTO","raw_affiliation_strings":["Graduate School of Applied Informatics, University of Hyogo"],"affiliations":[{"raw_affiliation_string":"Graduate School of Applied Informatics, University of Hyogo","institution_ids":["https://openalex.org/I180941496"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021671673","display_name":"Kazuhiko Minematsu","orcid":"https://orcid.org/0000-0002-3427-6772"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kazuhiko MINEMATSU","raw_affiliation_strings":["NEC Corporation"],"affiliations":[{"raw_affiliation_string":"NEC Corporation","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010755044","display_name":"Nao Shibata","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nao SHIBATA","raw_affiliation_strings":["NEC Solution Innovators"],"affiliations":[{"raw_affiliation_string":"NEC Solution Innovators","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071339655","display_name":"Maki Shigeri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maki SHIGERI","raw_affiliation_strings":["NEC Solution Innovators"],"affiliations":[{"raw_affiliation_string":"NEC Solution Innovators","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108680904","display_name":"Hiroyasu Kubo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hiroyasu KUBO","raw_affiliation_strings":["NEC Solution Innovators"],"affiliations":[{"raw_affiliation_string":"NEC Solution Innovators","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038936383","display_name":"Yuki Funabiki","orcid":null},"institutions":[{"id":"https://openalex.org/I65837984","display_name":"Kobe University","ror":"https://ror.org/03tgsfw79","country_code":"JP","type":"education","lineage":["https://openalex.org/I65837984"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yuki FUNABIKI","raw_affiliation_strings":["Graduate School of Engineering, Kobe University"],"affiliations":[{"raw_affiliation_string":"Graduate School of Engineering, Kobe University","institution_ids":["https://openalex.org/I65837984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056480052","display_name":"Takanori Isobe","orcid":"https://orcid.org/0000-0003-4253-5567"},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]},{"id":"https://openalex.org/I180941496","display_name":"University of Hyogo","ror":"https://ror.org/0151bmh98","country_code":"JP","type":"education","lineage":["https://openalex.org/I180941496"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takanori ISOBE","raw_affiliation_strings":["Graduate School of Applied Informatics, University of Hyogo","National Institute of Information and Communications Technology"],"affiliations":[{"raw_affiliation_string":"Graduate School of Applied Informatics, University of Hyogo","institution_ids":["https://openalex.org/I180941496"]},{"raw_affiliation_string":"National Institute of Information and Communications Technology","institution_ids":["https://openalex.org/I90023481"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5008561889"],"corresponding_institution_ids":["https://openalex.org/I180941496"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.17252777,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"E103.A","issue":"1","first_page":"212","last_page":"214"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7807390689849854},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7583725452423096},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6905515193939209},{"id":"https://openalex.org/keywords/bit","display_name":"Bit (key)","score":0.4990050792694092},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.478044331073761},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.44378286600112915},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.323351114988327},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.31331121921539307},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2833538055419922},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2729569673538208},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16078615188598633},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09471121430397034}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7807390689849854},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7583725452423096},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6905515193939209},{"id":"https://openalex.org/C117011727","wikidata":"https://www.wikidata.org/wiki/Q1278488","display_name":"Bit (key)","level":2,"score":0.4990050792694092},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.478044331073761},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.44378286600112915},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.323351114988327},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31331121921539307},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2833538055419922},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2729569673538208},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16078615188598633},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09471121430397034},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transfun.2019cil0004","is_oa":false,"landing_page_url":"https://doi.org/10.1587/transfun.2019cil0004","pdf_url":null,"source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W182571705","https://openalex.org/W1883151075","https://openalex.org/W2095934050","https://openalex.org/W4240762907"],"related_works":["https://openalex.org/W2411923897","https://openalex.org/W4285347720","https://openalex.org/W4200259850","https://openalex.org/W2333831899","https://openalex.org/W2484894494","https://openalex.org/W2367385042","https://openalex.org/W4381186982","https://openalex.org/W2040781570","https://openalex.org/W4226055750","https://openalex.org/W2777135250"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,22,43],"revisit":[4],"related-key":[5,57],"security":[6,47],"of":[7,28,49],"TWINE":[8,29,50],"block":[9],"cipher":[10],"with":[11,30,51],"80-bit":[12,32],"and":[13,36],"128-bit":[14,53],"keys.":[15],"Using":[16],"an":[17],"MILP-aided":[18],"automatic":[19],"search":[20],"algorithm,":[21],"point":[23],"out":[24],"the":[25,56,64,69],"previous":[26],"evaluation":[27,40,48],"a":[31,38,45,52],"key":[33,54],"is":[34],"wrong,":[35],"give":[37],"corrected":[39],"result.":[41],"Besides,":[42],"show":[44],"first":[46],"in":[55,68],"setting,":[58],"which":[59],"was":[60],"infeasible":[61],"due":[62],"to":[63],"high":[65],"computation":[66],"cost":[67],"original":[70],"proposal.":[71]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
