{"id":"https://openalex.org/W4282040101","doi":"https://doi.org/10.46586/tosc.v2022.i2.253-288","title":"Differential Trail Search in Cryptographic Primitives with Big-Circle Chi:","display_name":"Differential Trail Search in Cryptographic Primitives with Big-Circle Chi:","publication_year":2022,"publication_date":"2022-06-10","ids":{"openalex":"https://openalex.org/W4282040101","doi":"https://doi.org/10.46586/tosc.v2022.i2.253-288"},"language":"en","primary_location":{"id":"doi:10.46586/tosc.v2022.i2.253-288","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2022.i2.253-288","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/9721/9248","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/ToSC/article/download/9721/9248","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027799923","display_name":"Alireza Mehrdad","orcid":"https://orcid.org/0000-0001-6341-7944"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Alireza Mehrdad","raw_affiliation_strings":["Radboud University, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067049629","display_name":"Silvia Mella","orcid":"https://orcid.org/0000-0002-4664-3541"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Silvia Mella","raw_affiliation_strings":["Radboud University, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085134047","display_name":"Lorenzo Grassi","orcid":"https://orcid.org/0000-0003-1140-0520"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Lorenzo Grassi","raw_affiliation_strings":["Radboud University, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055847285","display_name":"Joan Daemen","orcid":"https://orcid.org/0000-0002-4102-0775"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Joan Daemen","raw_affiliation_strings":["Radboud University, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027799923"],"corresponding_institution_ids":["https://openalex.org/I145872427"],"apc_list":null,"apc_paid":null,"fwci":0.6898,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74498707,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"253","last_page":"288"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.6792031526565552},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6750783920288086},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.623522162437439},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.5995435118675232},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.573176383972168},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5432142615318298},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.5390834808349609},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47880133986473083},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.45106250047683716},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4445033073425293},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4183211922645569},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.41782256960868835},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3721862733364105},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3660106360912323},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.11395370960235596}],"concepts":[{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.6792031526565552},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6750783920288086},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.623522162437439},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.5995435118675232},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.573176383972168},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5432142615318298},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.5390834808349609},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47880133986473083},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.45106250047683716},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4445033073425293},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4183211922645569},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.41782256960868835},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3721862733364105},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3660106360912323},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.11395370960235596},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.46586/tosc.v2022.i2.253-288","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2022.i2.253-288","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/9721/9248","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c1669d2a5f72414881fd4f7e8905b728","is_oa":true,"landing_page_url":"https://doaj.org/article/c1669d2a5f72414881fd4f7e8905b728","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 2 (2022)","raw_type":"article"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/251015","is_oa":false,"landing_page_url":"https://hdl.handle.net/2066/251015","pdf_url":null,"source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article / Letter to editor"},{"id":"pmh:ru:oai:repository.ubn.ru.nl:2066/251015","is_oa":true,"landing_page_url":"http://hdl.handle.net/2066/251015","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, 2022, 253 - 288","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.46586/tosc.v2022.i2.253-288","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2022.i2.253-288","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/9721/9248","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8999999761581421,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4282040101.pdf","grobid_xml":"https://content.openalex.org/works/W4282040101.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W156355313","https://openalex.org/W197228877","https://openalex.org/W1556212265","https://openalex.org/W1629301835","https://openalex.org/W1979802565","https://openalex.org/W2160494425","https://openalex.org/W2164645101","https://openalex.org/W2234576048","https://openalex.org/W2504919933","https://openalex.org/W2599205485","https://openalex.org/W2605079652","https://openalex.org/W2757403014","https://openalex.org/W2950259258","https://openalex.org/W3030624396","https://openalex.org/W3097906587","https://openalex.org/W3109280591","https://openalex.org/W3158209657","https://openalex.org/W3170515938","https://openalex.org/W3184648873","https://openalex.org/W3205268470","https://openalex.org/W3210705930","https://openalex.org/W4213335922","https://openalex.org/W4232988949","https://openalex.org/W4235071738","https://openalex.org/W4240574532","https://openalex.org/W4241072010","https://openalex.org/W4241834408"],"related_works":["https://openalex.org/W57168481","https://openalex.org/W4230315357","https://openalex.org/W2560473362","https://openalex.org/W2509111091","https://openalex.org/W2003194200","https://openalex.org/W1990201054","https://openalex.org/W1539170589","https://openalex.org/W1410349837","https://openalex.org/W2949235530","https://openalex.org/W2950215720"],"abstract_inverted_index":{"Proving":[0],"upper":[1,48,289],"bounds":[2,49,290],"for":[3,183,225,239,245,291],"the":[4,23,51,60,65,68,72,80,86,91,109,114,122,159,172,177,193,208,240,267,275,279,288,292],"expected":[5],"differential":[6,10,54,110,257],"probability":[7,52],"(DP)":[8],"of":[9,25,53,64,71,82,90,113,124,151,242,270,282,294],"trails":[11,272,284,295],"is":[12,41,75,130,155,223],"a":[13,18,29,131,252],"standard":[14],"requirement":[15],"when":[16,141],"proposing":[17],"new":[19,237],"symmetric":[20],"primitive.":[21],"In":[22,79,106,228],"case":[24,81,108],"cryptographic":[26],"primitives":[27],"with":[28,98],"bit-oriented":[30],"round":[31,73,153],"function,":[32],"such":[33],"as":[34],"Keccak,":[35],"Xoodoo":[36,186],"and":[37,84,103,146,181,185,235,285,300],"Subterranean,":[38],"computer":[39],"assistance":[40],"required":[42],"in":[43,59,143,251,260],"order":[44],"to":[45,101,188,198,207,221,255,263],"prove":[46],"strong":[47],"on":[50,95,158,164],"trails.":[55],"The":[56,148],"techniques":[57,238,250],"described":[58],"literature":[61],"make":[62],"use":[63,123],"fact":[66,209],"that":[67,107,136,210],"non-linear":[69,115,149],"step":[70,150],"function":[74,154],"an":[76,165],"S-box":[77],"layer.":[78],"Keccak":[83,184],"Xoodoo,":[85],"S-boxes":[87],"are":[88],"instances":[89],"chi":[92,160,194,211],"mapping":[93,195],"operating":[94,163],"l-bit":[96],"circles":[97],"l":[99,166],"equal":[100],"5":[102],"3":[104],"respectively.":[105],"propagation":[111,191,218,244],"properties":[112],"layer":[116],"can":[117,200],"be":[118,201],"evaluated":[119],"efficiently":[120],"by":[121,274],"pre-computed":[125],"difference":[126,217,243],"distribution":[127],"tables.Subterranean":[128],"2.0":[129],"recently":[132],"proposed":[133,180],"cipher":[134],"suite":[135],"has":[137,212],"exceptionally":[138],"good":[139],"energy-efficiency":[140],"implemented":[142,248],"hardware":[144],"(ASIC":[145],"FPGA).":[147],"its":[152],"also":[156],"based":[157],"mapping,":[161],"but":[162],"=":[167],"257-bit":[168],"circle,":[169],"comprising":[170],"all":[171],"state":[173],"bits.":[174],"This":[175],"making":[176],"brute-force":[178],"approach":[179],"used":[182],"infeasible":[187],"apply.":[189],"Difference":[190],"through":[192],"from":[196,219],"input":[197,222],"output":[199,220],"treated":[202],"using":[203],"linear":[204],"algebra":[205],"thanks":[206],"algebraic":[213],"degree":[214],"2.":[215],"However,":[216],"problematic":[224],"big-circle":[226,246],"chi.":[227],"this":[229,233],"paper,":[230],"we":[231,265,277,286],"tackle":[232],"problem,":[234],"present":[236],"analysis":[241],"chi.We":[247],"these":[249],"dedicated":[253],"program":[254],"perform":[256],"trail":[258],"search":[259],"Subterranean.":[261],"Thanks":[262],"this,":[264],"confirm":[266],"maximum":[268,280],"DP":[269,281,293],"3-round":[271],"found":[273],"designers,":[276],"determine":[278],"4-round":[283],"improve":[287],"over":[296],"5,":[297],"6,":[298],"7":[299],"8":[301],"rounds.":[302]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2022-06-13T00:00:00"}
