{"id":"https://openalex.org/W4402370096","doi":"https://doi.org/10.3390/cryptography8030040","title":"Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants","display_name":"Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants","publication_year":2024,"publication_date":"2024-09-08","ids":{"openalex":"https://openalex.org/W4402370096","doi":"https://doi.org/10.3390/cryptography8030040"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography8030040","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030040","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/cryptography8030040","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107085757","display_name":"Riley Vaughn","orcid":null},"institutions":[{"id":"https://openalex.org/I12834331","display_name":"University of Wyoming","ror":"https://ror.org/01485tq96","country_code":"US","type":"education","lineage":["https://openalex.org/I12834331"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Riley Vaughn","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Wyoming, Laramie, WY 82071, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Wyoming, Laramie, WY 82071, USA","institution_ids":["https://openalex.org/I12834331"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086398848","display_name":"Mike Borowczak","orcid":"https://orcid.org/0000-0001-9409-8245"},"institutions":[{"id":"https://openalex.org/I106165777","display_name":"University of Central Florida","ror":"https://ror.org/036nfer12","country_code":"US","type":"education","lineage":["https://openalex.org/I106165777"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mike Borowczak","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816, USA"],"raw_orcid":"https://orcid.org/0000-0001-9409-8245","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816, USA","institution_ids":["https://openalex.org/I106165777"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5107085757"],"corresponding_institution_ids":["https://openalex.org/I12834331"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.3245,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83858876,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"8","issue":"3","first_page":"40","last_page":"40"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10683","display_name":"Mass Spectrometry Techniques and Applications","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/1607","display_name":"Spectroscopy"},"field":{"id":"https://openalex.org/fields/16","display_name":"Chemistry"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9731000065803528,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.49767187237739563},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3453989028930664},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.1541571319103241},{"id":"https://openalex.org/keywords/genetics","display_name":"Genetics","score":0.11992484331130981}],"concepts":[{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.49767187237739563},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3453989028930664},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.1541571319103241},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.11992484331130981}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography8030040","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030040","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:48e713d735a44caeaedf1a8247df822d","is_oa":true,"landing_page_url":"https://doaj.org/article/48e713d735a44caeaedf1a8247df822d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 8, Iss 3, p 40 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography8030040","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030040","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1504695911","https://openalex.org/W1795624981","https://openalex.org/W1982555755","https://openalex.org/W2074886859","https://openalex.org/W2109394932","https://openalex.org/W2113619720","https://openalex.org/W2121078396","https://openalex.org/W2789198772","https://openalex.org/W2915352631","https://openalex.org/W2949292972","https://openalex.org/W4211068006","https://openalex.org/W4312903735","https://openalex.org/W4395961527","https://openalex.org/W6630038615","https://openalex.org/W6633185006","https://openalex.org/W6637353479","https://openalex.org/W6638372327","https://openalex.org/W6847508977"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W1979597421","https://openalex.org/W2007980826","https://openalex.org/W2061531152","https://openalex.org/W3002753104","https://openalex.org/W2077600819","https://openalex.org/W2142036596","https://openalex.org/W2072657027","https://openalex.org/W2600246793","https://openalex.org/W4238204885"],"abstract_inverted_index":{"The":[0,82,113],"measure":[1],"of":[2,6,24,44,84,101,111,126,147,157],"diffusion,":[3],"the":[4,22,42,59,64,73,79,85,93,99,103,108,136,145,154,164,170,176],"property":[5,43],"dissipating":[7],"patterns":[8,25],"and":[9,71,144,178],"statistical":[10],"structures":[11],"in":[12,67,105,129],"cryptographic":[13,34],"transformations,":[14],"serves":[15],"as":[16],"a":[17],"valuable":[18],"heuristic":[19],"for":[20],"assessing":[21],"obscurity":[23],"that":[26],"could":[27],"lead":[28],"to":[29,40,78,115,163],"collisions.":[30],"As":[31],"with":[32,98],"many":[33],"hash":[35],"functions,":[36],"SHA-256":[37],"is":[38,50,55,89,120,139,151],"thought":[39],"exhibit":[41],"diffusion.":[45,81],"While":[46,153],"SHA-256\u2019s":[47],"diffuse":[48,182],"output":[49],"loosely":[51],"documented,":[52],"even":[53],"less":[54],"known":[56],"about":[57],"how":[58,72],"diffusion":[60,83,106,119,146],"rate":[61],"changes":[62],"across":[63,107],"64":[65,109],"rounds":[66,110],"its":[68],"compression":[69,87,137,172],"function":[70,88,138,159],"algorithm\u2019s":[74],"individual":[75],"sub-functions":[76,117,128],"contribute":[77],"overall":[80],"unmodified":[86,171],"initially":[90],"measured":[91],"using":[92],"Strict":[94],"Avalanche":[95],"Criterion":[96],"(SAC),":[97],"aim":[100],"understanding":[102],"alteration":[104],"compression.":[112],"level":[114],"which":[116],"affect":[118],"subsequently":[121],"measured,":[122],"enabling":[123],"potential":[124],"prioritization":[125],"these":[127,148],"future":[130],"collision":[131],"attacks.":[132],"To":[133],"accomplish":[134],"this,":[135],"modified":[140],"by":[141],"removing":[142],"sub-functions,":[143],"new":[149],"variants":[150],"measured.":[152],"SAC":[155],"measurements":[156],"each":[158],"eventually":[160],"plateau":[161],"close":[162],"50%":[165],"target,":[166],"no":[167],"function,":[168,173],"including":[169],"strictly":[174],"meets":[175],"SAC,":[177],"multiple":[179],"variant":[180],"functions":[181],"at":[183],"comparatively":[184],"slower":[185],"rates.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
