{"id":"https://openalex.org/W3148977311","doi":"https://doi.org/10.46586/tosc.v2021.i1.130-155","title":"Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon","display_name":"Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon","publication_year":2021,"publication_date":"2021-03-19","ids":{"openalex":"https://openalex.org/W3148977311","doi":"https://doi.org/10.46586/tosc.v2021.i1.130-155","mag":"3148977311"},"language":"en","primary_location":{"id":"doi:10.46586/tosc.v2021.i1.130-155","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2021.i1.130-155","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/8835/8438","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/ToSC/article/download/8835/8438","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088817236","display_name":"Raghvendra Rohit","orcid":"https://orcid.org/0000-0002-5272-1016"},"institutions":[{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]},{"id":"https://openalex.org/I56067802","display_name":"Universit\u00e9 de Rennes","ror":"https://ror.org/015m7wh34","country_code":"FR","type":"education","lineage":["https://openalex.org/I56067802"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Raghvendra Rohit","raw_affiliation_strings":["Univ Rennes, Centre National de la Recherche Scientifique (CNRS), Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires (IRISA), Rennes, France"],"affiliations":[{"raw_affiliation_string":"Univ Rennes, Centre National de la Recherche Scientifique (CNRS), Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires (IRISA), Rennes, France","institution_ids":["https://openalex.org/I2802519937","https://openalex.org/I56067802","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057094044","display_name":"Kai Hu","orcid":"https://orcid.org/0000-0003-3552-7200"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Hu","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, Shandong, China","School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, Shandong, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China; Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046539794","display_name":"Sumanta Sarkar","orcid":"https://orcid.org/0000-0002-6303-617X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sumanta Sarkar","raw_affiliation_strings":["TCS Innovation Labs, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"TCS Innovation Labs, Hyderabad, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027649882","display_name":"Siwei Sun","orcid":"https://orcid.org/0000-0002-3058-2377"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siwei Sun","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China6 University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China6 University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088817236"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I2802519937","https://openalex.org/I56067802"],"apc_list":null,"apc_paid":null,"fwci":3.4997,"has_fulltext":true,"cited_by_count":31,"citation_normalized_percentile":{"value":0.9366146,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"130","last_page":"155"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.7091224193572998},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6839922070503235},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.6570595502853394},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6462467908859253},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4958687722682953},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48170119524002075},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47658678889274597},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4685056507587433},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.464192271232605},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4348083734512329},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32821205258369446},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29124853014945984}],"concepts":[{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.7091224193572998},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6839922070503235},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.6570595502853394},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6462467908859253},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4958687722682953},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48170119524002075},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47658678889274597},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4685056507587433},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.464192271232605},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4348083734512329},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32821205258369446},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29124853014945984},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tosc.v2021.i1.130-155","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2021.i1.130-155","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/8835/8438","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a8eb8f7ca33049c8b5d46c78be97e05e","is_oa":true,"landing_page_url":"https://doaj.org/article/a8eb8f7ca33049c8b5d46c78be97e05e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 1 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tosc.v2021.i1.130-155","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2021.i1.130-155","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/8835/8438","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G113262062","display_name":null,"funder_award_id":"201801","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2148922514","display_name":null,"funder_award_id":"2018YFA0704704","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G302098812","display_name":"Audit tools for cryptographic primitives","funder_award_id":"ANR-17-CE39-0003","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4979479644","display_name":null,"funder_award_id":"2018YFA070470","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5467697000","display_name":null,"funder_award_id":"62032014","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5653340552","display_name":null,"funder_award_id":"2018YFA0704702","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6258415954","display_name":null,"funder_award_id":"Chinese","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6721909089","display_name":null,"funder_award_id":"201801","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6803667113","display_name":null,"funder_award_id":"ANR-17","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G7537146174","display_name":null,"funder_award_id":"61772519","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7735407926","display_name":null,"funder_award_id":"62032014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8955107213","display_name":null,"funder_award_id":"Major","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320320883","display_name":"Agence Nationale de la Recherche","ror":"https://ror.org/00rbzpz17"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3148977311.pdf","grobid_xml":"https://content.openalex.org/works/W3148977311.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W197228877","https://openalex.org/W285711858","https://openalex.org/W1514489116","https://openalex.org/W1855109561","https://openalex.org/W2131384593","https://openalex.org/W2160494425","https://openalex.org/W2165883295","https://openalex.org/W2166473670","https://openalex.org/W2238818043","https://openalex.org/W2344976035","https://openalex.org/W2476423892","https://openalex.org/W2504274129","https://openalex.org/W2549714595","https://openalex.org/W2562655613","https://openalex.org/W2576186740","https://openalex.org/W2604873466","https://openalex.org/W2613849344","https://openalex.org/W2620067289","https://openalex.org/W2740160172","https://openalex.org/W2768296225","https://openalex.org/W2792542066","https://openalex.org/W2794764242","https://openalex.org/W2810908956","https://openalex.org/W2941076300","https://openalex.org/W2949078646","https://openalex.org/W2991554051","https://openalex.org/W3087218913","https://openalex.org/W3091007029","https://openalex.org/W4231852103","https://openalex.org/W4241299894","https://openalex.org/W4242655995"],"related_works":["https://openalex.org/W2951181267","https://openalex.org/W2407726188","https://openalex.org/W4386737895","https://openalex.org/W4302854873","https://openalex.org/W3216230948","https://openalex.org/W3030044402","https://openalex.org/W4253338219","https://openalex.org/W2766321958","https://openalex.org/W2396343634","https://openalex.org/W3013793794"],"abstract_inverted_index":{"Being":[0],"one":[1],"of":[2,6,16,55,73,87,105,145,180,234,246],"the":[3,7,17,23,70,80,83,90,103,109,114,120,140,146,172,216,232,243],"winning":[4],"algorithms":[5],"CAESAR":[8],"competition":[9],"and":[10,33,39,161,186,190,222],"currently":[11],"a":[12,125,151,177],"second":[13],"round":[14],"candidate":[15],"NIST":[18],"lightweight":[19],"cryptography":[20],"standardization":[21],"project,":[22],"authenticated":[24],"encryption":[25],"scheme":[26],"Ascon":[27,47,88,107,160,184],"(designed":[28],"by":[29,79],"Dobraunig,":[30],"Eichlseder,":[31],"Mendel,":[32],"Schl\u00e4ffer)":[34],"has":[35],"withstood":[36],"extensive":[37],"self":[38],"third-party":[40],"cryptanalysis.":[41],"The":[42],"best":[43,84,168],"known":[44,85],"attack":[45,169],"on":[46,196],"could":[48],"only":[49,94],"penetrate":[50],"up":[51],"to":[52,59,158],"7":[53,211],"(out":[54],"12)":[56],"rounds":[57],"due":[58],"Li":[60],"et":[61],"al.":[62],"(ToSC":[63],"Vol":[64],"I,":[65],"2017).":[66],"However,":[67],"it":[68],"violates":[69],"data":[71,115,189],"limit":[72,116],"264":[74,188],"blocks":[75],"per":[76],"key":[77,164,175],"specified":[78,118],"designers.":[81],"Moreover,":[82],"distinguishers":[86,218],"in":[89,108,119,242],"AEAD":[91],"context":[92],"reach":[93],"6":[95,223],"rounds.":[96,212,224],"To":[97],"fill":[98],"these":[99],"gaps,":[100],"we":[101,123,199],"revisit":[102],"security":[104,233,244],"7-round":[106,159,183],"nonce-respecting":[110],"setting":[111],"without":[112],"violating":[113],"as":[117,130],"design.":[121],"First,":[122],"introduce":[124],"new":[126,240],"superpoly-recovery":[127],"technique":[128],"named":[129],"partial":[131],"polynomial":[132],"multiplication":[133],"for":[134,150,219],"which":[135],"computations":[136],"take":[137],"place":[138],"between":[139],"so-called":[141],"degree-d":[142],"homogeneous":[143],"parts":[144],"involved":[147],"Boolean":[148],"functions":[149],"2d-dimensional":[152],"cube.":[153],"We":[154,213],"apply":[155],"this":[156],"method":[157],"present":[162],"several":[163,201],"recovery":[165],"attacks.":[166],"Our":[167],"can":[170],"recover":[171],"128-bit":[173],"secret":[174],"with":[176],"time":[178],"complexity":[179],"about":[181],"2123":[182],"permutations":[185],"requires":[187],"2101":[191],"bits":[192],"memory.":[193],"Also,":[194],"based":[195],"division":[197],"properties,":[198],"identify":[200],"60":[202],"dimensional":[203],"cubes":[204],"whose":[205],"superpolies":[206],"are":[207,228],"constant":[208],"zero":[209],"after":[210],"further":[214],"improve":[215],"cube":[217],"4,":[220],"5":[221],"Although":[225],"our":[226],"results":[227],"far":[229],"from":[230],"threatening":[231],"full":[235],"12-round":[236],"Ascon,":[237],"they":[238],"provide":[239],"insights":[241],"analysis":[245],"Ascon.":[247]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
