{"id":"https://openalex.org/W4388759580","doi":"https://doi.org/10.3233/jcs-230052","title":"Cache attacks on subkey calculation of\u00a0Blowfish","display_name":"Cache attacks on subkey calculation of\u00a0Blowfish","publication_year":2023,"publication_date":"2023-11-15","ids":{"openalex":"https://openalex.org/W4388759580","doi":"https://doi.org/10.3233/jcs-230052"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-230052","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-230052","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033407286","display_name":"Haopeng Fan","orcid":"https://orcid.org/0000-0001-8108-0214"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haopeng Fan","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Haopeng Fan","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haopeng Fan","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390306","display_name":"Wenhao Wang","orcid":"https://orcid.org/0000-0001-7346-3733"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenhao Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yongjuan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yongjuan Wang","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yongjuan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongjuan Wang","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016438781","display_name":"Xiang\u2010Bin Wang","orcid":"https://orcid.org/0000-0002-3026-9364"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangbin Wang","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016438781","display_name":"Xiang\u2010Bin Wang","orcid":"https://orcid.org/0000-0002-3026-9364"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangbin Wang","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111420243","display_name":"Yang Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Gao","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111420243","display_name":"Yang Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Gao","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5016438781","https://openalex.org/A5100390306","https://openalex.org/A5111420243"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210132990","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.1719,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58348347,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"32","issue":"2","first_page":"165","last_page":"191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8335793018341064},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4808431565761566},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4199366867542267},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4016454219818115},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35273879766464233},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.289961576461792}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8335793018341064},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4808431565761566},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4199366867542267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4016454219818115},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35273879766464233},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.289961576461792}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-230052","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-230052","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W178356831","https://openalex.org/W1488986397","https://openalex.org/W1496265857","https://openalex.org/W1503814339","https://openalex.org/W1527701244","https://openalex.org/W1890449996","https://openalex.org/W1934458198","https://openalex.org/W1978537891","https://openalex.org/W2126132644","https://openalex.org/W2131202839","https://openalex.org/W2172060328","https://openalex.org/W2766026515","https://openalex.org/W2905380323","https://openalex.org/W2925685215","https://openalex.org/W2952265249","https://openalex.org/W3014603789","https://openalex.org/W3134433215","https://openalex.org/W3141072087","https://openalex.org/W3155615090","https://openalex.org/W3209403391","https://openalex.org/W4254175419","https://openalex.org/W4308691297","https://openalex.org/W6604467750"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W2357388125","https://openalex.org/W1892002809"],"abstract_inverted_index":{"Cache":[0],"attacks":[1,20,126,145],"pose":[2],"a":[3,50,76,87],"serious":[4],"security":[5],"threat":[6],"to":[7,48,68,74,94,146,183],"cryptographic":[8],"implementations":[9],"in":[10,79,134,137,177],"processor":[11],"architectures.":[12],"In":[13,114],"this":[14],"paper,":[15],"we":[16,85,117,141],"first":[17],"propose":[18],"cache":[19,71,91,112],"against":[21],"Blowfish,":[22,39],"which":[23],"can":[24,158,171],"break":[25],"the":[26,35,45,55,64,70,96,100,108,129,164,173,178,185],"protection":[27],"of":[28,38,44,60,99,103,111,132],"key-dependent":[29],"S-box.":[30],"This":[31],"attack":[32,92,155,170],"targets":[33],"at":[34],"subkey":[36,46],"calculation":[37,47],"and":[40,62,106,122,127,152],"fully":[41],"exploits":[42],"features":[43],"construct":[49],"leakage":[51,72,88],"equation":[52],"group":[53],"about":[54],"key.":[56],"Without":[57],"any":[58,160],"knowledge":[59],"plaintext":[61,161],"ciphertext,":[63],"attacker":[65],"only":[66],"needs":[67],"obtain":[69],"once":[73],"recover":[75,128,159,172],"variable-length":[77],"key":[78,131],"minute-level":[80],"time.":[81],"More":[82],"than":[83],"that,":[84],"establish":[86],"model":[89],"for":[90,167],"situations":[93],"evaluate":[95],"exhausting":[97],"space":[98],"intermediate":[101],"value":[102],"block":[104],"ciphers,":[105],"estimate":[107],"time":[109],"complexity":[110],"attacks.":[113],"our":[115,144,169],"experiments,":[116],"perform":[118],"Flush":[119],"+":[120,124],"Reload":[121],"Prime":[123],"Probe":[125],"random":[130],"Blowfish":[133],"OpenSSL":[135],"1.1.1h":[136],"4":[138],"minutes.":[139],"Furthermore,":[140],"have":[142],"applied":[143],"existing":[147],"systems,":[148],"such":[149],"as":[150],"JavaScript-blowfish":[151,157],"Bcrypt.":[153],"Our":[154],"on":[156],"input":[162],"by":[163],"user.":[165],"As":[166],"Bcrypt,":[168],"hash":[174],"values":[175],"stored":[176],"database,":[179],"thereby":[180],"allowing":[181],"attackers":[182],"impersonate":[184],"user\u2019s":[186],"identity.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-16T06:03:46.269776","created_date":"2025-10-10T00:00:00"}
