{"id":"https://openalex.org/W4319959431","doi":"https://doi.org/10.3390/cryptography7010008","title":"Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds","display_name":"Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds","publication_year":2023,"publication_date":"2023-02-09","ids":{"openalex":"https://openalex.org/W4319959431","doi":"https://doi.org/10.3390/cryptography7010008"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7010008","pdf_url":"https://www.mdpi.com/2410-387X/7/1/8/pdf?version=1677208437","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/1/8/pdf?version=1677208437","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088422973","display_name":"Reham Almukhlifi","orcid":"https://orcid.org/0000-0002-7041-6461"},"institutions":[{"id":"https://openalex.org/I23075662","display_name":"Taibah University","ror":"https://ror.org/01xv1nn60","country_code":"SA","type":"education","lineage":["https://openalex.org/I23075662"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Reham Almukhlifi","raw_affiliation_strings":["Department of Computer Science, Taibah University, Medina 42353, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Taibah University, Medina 42353, Saudi Arabia","institution_ids":["https://openalex.org/I23075662"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102161581","display_name":"Poorvi L. Vora","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Poorvi L. Vora","raw_affiliation_strings":["Department of Computer Science, The George Washington University, Washington, DC 20052, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The George Washington University, Washington, DC 20052, USA","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088422973"],"corresponding_institution_ids":["https://openalex.org/I23075662"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.8741,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77426626,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"7","issue":"1","first_page":"8","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8438123464584351},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.8099322319030762},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6306971311569214},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5871004462242126},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.5765780210494995},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.5717806220054626},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5004971027374268},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45580151677131653},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4429195523262024},{"id":"https://openalex.org/keywords/higher-order-differential-cryptanalysis","display_name":"Higher-order differential cryptanalysis","score":0.4344823956489563},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.42624837160110474},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.4151158034801483},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3888455629348755},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3417161703109741},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3394947946071625},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2973167300224304},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1742403507232666}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8438123464584351},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.8099322319030762},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6306971311569214},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5871004462242126},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.5765780210494995},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.5717806220054626},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5004971027374268},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45580151677131653},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4429195523262024},{"id":"https://openalex.org/C151607707","wikidata":"https://www.wikidata.org/wiki/Q11673206","display_name":"Higher-order differential cryptanalysis","level":5,"score":0.4344823956489563},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.42624837160110474},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.4151158034801483},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3888455629348755},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3417161703109741},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3394947946071625},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2973167300224304},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1742403507232666}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography7010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7010008","pdf_url":"https://www.mdpi.com/2410-387X/7/1/8/pdf?version=1677208437","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0d868e37a4b5477ea756cd38389f96ac","is_oa":true,"landing_page_url":"https://doaj.org/article/0d868e37a4b5477ea756cd38389f96ac","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 1, p 8 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7010008","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7010008","pdf_url":"https://www.mdpi.com/2410-387X/7/1/8/pdf?version=1677208437","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1674719799","display_name":null,"funder_award_id":"1421373","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4319959431.pdf","grobid_xml":"https://content.openalex.org/works/W4319959431.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W32121401","https://openalex.org/W1964723977","https://openalex.org/W2083383916","https://openalex.org/W2190847501","https://openalex.org/W2217721338","https://openalex.org/W2293734300","https://openalex.org/W2327189279","https://openalex.org/W2342403614","https://openalex.org/W2539557139","https://openalex.org/W2755326682","https://openalex.org/W2793476918","https://openalex.org/W2969401102","https://openalex.org/W3005870756","https://openalex.org/W3010777788","https://openalex.org/W3097909779","https://openalex.org/W3183153870","https://openalex.org/W3192528731","https://openalex.org/W4283803559","https://openalex.org/W6680165010"],"related_works":["https://openalex.org/W2557174342","https://openalex.org/W2949235530","https://openalex.org/W2996824228","https://openalex.org/W1598870173","https://openalex.org/W233271294","https://openalex.org/W1597771876","https://openalex.org/W2003194200","https://openalex.org/W4214545183","https://openalex.org/W2199077113","https://openalex.org/W2399978900"],"abstract_inverted_index":{"The":[0,56],"Simeck":[1,115,118,152,156,161,195],"family":[2],"of":[3,20,33,42,54,68,72,76,79,95,109,125,146,151,155,160,168,185],"lightweight":[4],"block":[5,23],"ciphers":[6,24],"was":[7],"proposed":[8,30],"by":[9,120],"Yang":[10],"et":[11],"al.":[12],"in":[13,106,114],"2015,":[14],"which":[15],"combines":[16],"the":[17,21,31,40,62,73,77,80,92,96,122,165,169,175,183],"design":[18],"features":[19],"NSA-designed":[22],"Simon":[25],"and":[26,47,117,158,191],"Speck.":[27],"Previously,":[28],"we":[29,138],"use":[32],"linear":[34,58,141,186],"cryptanalysis":[35,187],"using":[36,130],"super-rounds":[37],"to":[38,101],"increase":[39],"efficiency":[41],"implementing":[43],"Matsui\u2019s":[44],"second":[45],"algorithm":[46],"achieved":[48],"good":[49],"results":[50,184],"on":[51,83,149,188],"all":[52,107,144],"variants":[53,94,108,145],"Simon.":[55],"improved":[57,140],"attacks":[59,142,148],"result":[60],"from":[61],"observation":[63],"that,":[64],"after":[65],"four":[66],"rounds":[67,193],"encryption,":[69],"one":[70],"bit":[71],"left":[74],"half":[75],"state":[78],"cipher":[81],"depends":[82],"only":[84],"17":[85],"key":[86,89,172],"bits":[87,90,133],"(19":[88],"for":[91,194],"larger":[93],"cipher).":[97],"We":[98,180],"were":[99],"able":[100],"follow":[102],"a":[103,126],"similar":[104],"approach,":[105],"Simeck,":[110],"with":[111,164],"an":[112],"improvement":[113],"32":[116],"48":[119],"relaxing":[121],"previous":[123],"constraint":[124],"single":[127],"active":[128,132],"bit,":[129],"multiple":[131,178],"instead.":[134],"In":[135],"this":[136],"paper":[137],"present":[139],"against":[143],"Simeck:":[147],"19-rounds":[150],"32/64,":[153],"28-rounds":[154],"48/96,":[157],"34-rounds":[159],"64/128,":[162],"often":[163],"direct":[166],"recovery":[167],"full":[170],"master":[171],"without":[173],"repeating":[174],"attack":[176],"over":[177],"rounds.":[179],"also":[181],"verified":[182],"8,":[189],"10,":[190],"12":[192],"32/64.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
