{"id":"https://openalex.org/W4411467037","doi":"https://doi.org/10.32604/cmc.2025.065296","title":"An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm","display_name":"An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411467037","doi":"https://doi.org/10.32604/cmc.2025.065296"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065296","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065296","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065296","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100339951","display_name":"Bing Liu","orcid":"https://orcid.org/0000-0003-1634-4193"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bing Liu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027905223","display_name":"Ting Nie","orcid":"https://orcid.org/0000-0002-0676-3506"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ting Nie","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109521456","display_name":"Yan-Song Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yansong Liu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5101637603","display_name":"Weibo Hu","orcid":"https://orcid.org/0000-0002-3991-7575"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Weibo Hu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100339951"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18215165,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"3","first_page":"4583","last_page":"4599"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5544999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5544999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.644210696220398},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.6376398205757141},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5816962122917175},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5578485727310181},{"id":"https://openalex.org/keywords/optimization-algorithm","display_name":"Optimization algorithm","score":0.5165228247642517},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23512345552444458},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18108180165290833},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.17320528626441956}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.644210696220398},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.6376398205757141},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5816962122917175},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5578485727310181},{"id":"https://openalex.org/C2987595161","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Optimization algorithm","level":2,"score":0.5165228247642517},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23512345552444458},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18108180165290833},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.17320528626441956}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065296","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065296","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065296","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065296","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2128765501","https://openalex.org/W2746495499","https://openalex.org/W2897128759","https://openalex.org/W2949110138","https://openalex.org/W2958337549","https://openalex.org/W4232078629","https://openalex.org/W4362500767","https://openalex.org/W4388199965"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4366549320","https://openalex.org/W4287863136","https://openalex.org/W3006015132","https://openalex.org/W2965078190","https://openalex.org/W4408464351","https://openalex.org/W2140656843","https://openalex.org/W3040644038","https://openalex.org/W3203633096"],"abstract_inverted_index":{"Among":[0],"the":[1,6,12,33,51,59,67,72,92,123,142,160,171],"four":[2],"candidate":[3],"algorithms":[4],"in":[5,141,153],"fourth":[7],"round":[8],"of":[9,71,162],"NIST":[10],"standardization,":[11],"BIKE":[13,34,73,143],"(Bit":[14],"Flipping":[15],"Key":[16],"Encapsulation)":[17],"scheme":[18,35,144],"has":[19],"a":[20,85,105,138],"small":[21],"key":[22,56,87,108],"size":[23],"and":[24,54,83,110],"high":[25],"efficiency,":[26],"showing":[27],"good":[28],"prospects":[29],"for":[30,91,150,173],"application.":[31],"However,":[32],"based":[36,96],"on":[37,97],"QC-MDPC":[38,163],"(Quasi":[39],"Cyclic":[40],"Medium":[41],"Density":[42],"Parity":[43],"Check)":[44],"codes":[45],"still":[46],"faces":[47],"challenges":[48],"such":[49],"as":[50],"GJS":[52],"attack":[53,89],"weak":[55,86,107],"attacks":[57],"targeting":[58,120],"decoding":[60,69,94],"failure":[61,126],"rate":[62,127],"(DFR).":[63],"This":[64,133],"paper":[65],"analyzes":[66],"BGF":[68,93],"algorithm":[70,95],"scheme,":[74],"revealing":[75],"two":[76,99],"deep":[77],"factors":[78],"that":[79],"lead":[80],"to":[81],"DFR,":[82],"proposes":[84],"optimization":[88],"method":[90,103],"these":[98,158],"factors.":[100],"The":[101],"proposed":[102],"constructs":[104],"new":[106],"set,":[109],"experiment":[111],"results":[112],"eventually":[113],"indicate":[114],"that,":[115],"considering":[116],"BIKE\u2019s":[117],"parameter":[118],"set":[119],"128-bit":[121],"security,":[122],"average":[124],"decryption":[125],"is":[128],"lowerly":[129],"bounded":[130],"by":[131],".":[132],"result":[134],"not":[135],"only":[136],"highlights":[137],"significant":[139],"vulnerability":[140],"but":[145],"also":[146],"provides":[147],"valuable":[148],"insights":[149],"future":[151],"improvements":[152],"its":[154],"design.":[155],"By":[156],"addressing":[157],"weaknesses,":[159],"robustness":[161],"code-based":[164],"cryptographic":[165,177],"systems":[166],"can":[167],"be":[168],"enhanced,":[169],"paving":[170],"way":[172],"more":[174],"secure":[175],"post-quantum":[176],"solutions.":[178]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
