{"id":"https://openalex.org/W3016036459","doi":"https://doi.org/10.3934/amc.2020081","title":"Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack","display_name":"Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack","publication_year":2020,"publication_date":"2020-04-13","ids":{"openalex":"https://openalex.org/W3016036459","doi":"https://doi.org/10.3934/amc.2020081","mag":"3016036459"},"language":"en","primary_location":{"id":"doi:10.3934/amc.2020081","is_oa":true,"landing_page_url":"https://doi.org/10.3934/amc.2020081","pdf_url":"https://www.aimsciences.org/article/exportPdf?id=eda1043b-5613-43f5-b95f-7da4ad236cee","source":{"id":"https://openalex.org/S161492159","display_name":"Advances in Mathematics of Communications","issn_l":"1930-5338","issn":["1930-5338","1930-5346"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315844","host_organization_name":"American Institute of Mathematical Sciences","host_organization_lineage":["https://openalex.org/P4310315844"],"host_organization_lineage_names":["American Institute of Mathematical Sciences"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Mathematics of Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.aimsciences.org/article/exportPdf?id=eda1043b-5613-43f5-b95f-7da4ad236cee","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102867969","display_name":"Nishant Sinha","orcid":"https://orcid.org/0000-0002-5393-9965"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nishant Sinha","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5102867969"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.137,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.5307946,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"15","issue":"3","first_page":"539","last_page":"556"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.8991912603378296},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.7496567964553833},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.605798602104187},{"id":"https://openalex.org/keywords/stream-cipher-attack","display_name":"Stream cipher attack","score":0.5634971261024475},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5201959609985352},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.4914196729660034},{"id":"https://openalex.org/keywords/two-square-cipher","display_name":"Two-square cipher","score":0.45332494378089905},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.43357133865356445},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.38238534331321716},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3751874566078186},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35865312814712524},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34941262006759644},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2395230233669281},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15195196866989136}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.8991912603378296},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.7496567964553833},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.605798602104187},{"id":"https://openalex.org/C96675983","wikidata":"https://www.wikidata.org/wiki/Q7622661","display_name":"Stream cipher attack","level":4,"score":0.5634971261024475},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5201959609985352},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.4914196729660034},{"id":"https://openalex.org/C60153865","wikidata":"https://www.wikidata.org/wiki/Q1124307","display_name":"Two-square cipher","level":5,"score":0.45332494378089905},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.43357133865356445},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.38238534331321716},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3751874566078186},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35865312814712524},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34941262006759644},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2395230233669281},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15195196866989136}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3934/amc.2020081","is_oa":true,"landing_page_url":"https://doi.org/10.3934/amc.2020081","pdf_url":"https://www.aimsciences.org/article/exportPdf?id=eda1043b-5613-43f5-b95f-7da4ad236cee","source":{"id":"https://openalex.org/S161492159","display_name":"Advances in Mathematics of Communications","issn_l":"1930-5338","issn":["1930-5338","1930-5346"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315844","host_organization_name":"American Institute of Mathematical Sciences","host_organization_lineage":["https://openalex.org/P4310315844"],"host_organization_lineage_names":["American Institute of Mathematical Sciences"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Mathematics of Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.3934/amc.2020081","is_oa":true,"landing_page_url":"https://doi.org/10.3934/amc.2020081","pdf_url":"https://www.aimsciences.org/article/exportPdf?id=eda1043b-5613-43f5-b95f-7da4ad236cee","source":{"id":"https://openalex.org/S161492159","display_name":"Advances in Mathematics of Communications","issn_l":"1930-5338","issn":["1930-5338","1930-5346"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315844","host_organization_name":"American Institute of Mathematical Sciences","host_organization_lineage":["https://openalex.org/P4310315844"],"host_organization_lineage_names":["American Institute of Mathematical Sciences"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Mathematics of Communications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3016036459.pdf","grobid_xml":"https://content.openalex.org/works/W3016036459.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1544956979","https://openalex.org/W1554090281","https://openalex.org/W1565205193","https://openalex.org/W1600415638","https://openalex.org/W2006824395","https://openalex.org/W2012646342","https://openalex.org/W2020364349","https://openalex.org/W2078050139","https://openalex.org/W2124192227","https://openalex.org/W2130943734","https://openalex.org/W2141060521","https://openalex.org/W2249286906","https://openalex.org/W2769536222","https://openalex.org/W4234875403"],"related_works":["https://openalex.org/W2390578388","https://openalex.org/W2031363905","https://openalex.org/W2357387812","https://openalex.org/W2020890044","https://openalex.org/W186919122","https://openalex.org/W2950447949","https://openalex.org/W1489350638","https://openalex.org/W1977995103","https://openalex.org/W2133254303","https://openalex.org/W3125259055"],"abstract_inverted_index":{"<p":[0],"style='text-indent:20px;'>Espresso":[1],"is":[2,19,36,85,106],"a":[3,30],"stream":[4,82],"cipher":[5,18,28,56,98],"proposed":[6],"for":[7],"the":[8,14,22,27,37,40,59,74,93,97,101,110,122,125],"5G":[9],"wireless":[10],"communication":[11],"system.":[12],"Since":[13],"design":[15],"of":[16,25,76,80,113,124],"this":[17,55],"based":[20,86],"on":[21,54,87,96],"Galois":[23,69,88],"configuration":[24],"NLFSR,":[26],"has":[29],"short":[31],"propagation":[32],"delay,":[33],"and":[34,47,57,90],"it":[35],"fastest":[38],"among":[39],"ciphers":[41],"below":[42],"1500":[43],"GE,":[44],"including":[45],"Grain-128":[46],"Trivium.":[48],"The":[49],"time-memory-data":[50],"tradeoff":[51],"(TMDTO)":[52],"attack":[53,95,111,115],"finding":[58],"conditional":[60,77],"BSW":[61],"sampling":[62,103],"resistance":[63,79],"are":[64,116],"difficult":[65],"due":[66],"to":[67],"its":[68],"configuration.":[70],"This":[71],"paper":[72],"demonstrates":[73],"calculation":[75],"BSW-sampling":[78],"Espresso":[81],"cipher,":[83],"which":[84],"configuration,":[89],"also":[91,107],"mounts":[92],"TMDTO":[94,114],"by":[99,121],"employing":[100],"calculated":[102],"resistance.":[104],"It":[105],"shown":[108],"that":[109],"complexities":[112],"lower":[117],"than":[118],"those":[119],"claimed":[120],"designers":[123],"ciphers.":[126]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-02T06:13:33.250793","created_date":"2025-10-10T00:00:00"}
