{"id":"https://openalex.org/W4324139644","doi":"https://doi.org/10.46586/tosc.v2023.i1.244-287","title":"Chosen-Key Secure Even-Mansour Cipher from a Single Permutation","display_name":"Chosen-Key Secure Even-Mansour Cipher from a Single Permutation","publication_year":2023,"publication_date":"2023-03-10","ids":{"openalex":"https://openalex.org/W4324139644","doi":"https://doi.org/10.46586/tosc.v2023.i1.244-287"},"language":"en","primary_location":{"id":"doi:10.46586/tosc.v2023.i1.244-287","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2023.i1.244-287","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/10314/9755","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/ToSC/article/download/10314/9755","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074306180","display_name":"Shanjie Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shanjie Xu","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China; School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China","School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China; School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054056931","display_name":"Qi Da","orcid":null},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Da","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China; School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China","School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China; School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062882585","display_name":"Chun Guo","orcid":"https://orcid.org/0000-0002-8520-6301"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chun Guo","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China; School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China; Shandong Research Institute of Industrial Technology, Jinan, Shandong, China","Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China","School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","Shandong Research Institute of Industrial Technology, Jinan, Shandong, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China; School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China; Shandong Research Institute of Industrial Technology, Jinan, Shandong, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Shandong Research Institute of Industrial Technology, Jinan, Shandong, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074306180"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":0.337,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62804425,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"244","last_page":"287"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-permutation","display_name":"Random permutation","score":0.6683018803596497},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.6347662210464478},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.6111186146736145},{"id":"https://openalex.org/keywords/iterated-function","display_name":"Iterated function","score":0.5836426019668579},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.5754372477531433},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.5557820796966553},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.5377263426780701},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.5369341969490051},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4748920500278473},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4716716706752777},{"id":"https://openalex.org/keywords/affine-transformation","display_name":"Affine transformation","score":0.4338805079460144},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.39837947487831116},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.26998937129974365},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2685261368751526},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20305904746055603},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1348722279071808},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.09504663944244385},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.08887270092964172},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08720532059669495},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.07520627975463867},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.05118510127067566}],"concepts":[{"id":"https://openalex.org/C200985842","wikidata":"https://www.wikidata.org/wiki/Q3375503","display_name":"Random permutation","level":3,"score":0.6683018803596497},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6347662210464478},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.6111186146736145},{"id":"https://openalex.org/C140479938","wikidata":"https://www.wikidata.org/wiki/Q5254619","display_name":"Iterated function","level":2,"score":0.5836426019668579},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.5754372477531433},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.5557820796966553},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.5377263426780701},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.5369341969490051},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4748920500278473},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4716716706752777},{"id":"https://openalex.org/C92757383","wikidata":"https://www.wikidata.org/wiki/Q382497","display_name":"Affine transformation","level":2,"score":0.4338805079460144},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.39837947487831116},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.26998937129974365},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2685261368751526},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20305904746055603},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1348722279071808},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.09504663944244385},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.08887270092964172},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08720532059669495},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.07520627975463867},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.05118510127067566},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tosc.v2023.i1.244-287","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2023.i1.244-287","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/10314/9755","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:efb054b0cf434f1ea7ee381946e6a2d3","is_oa":false,"landing_page_url":"https://doaj.org/article/efb054b0cf434f1ea7ee381946e6a2d3","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 1 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tosc.v2023.i1.244-287","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2023.i1.244-287","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/10314/9755","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2472487643","display_name":null,"funder_award_id":"62002202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4324139644.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W105372217","https://openalex.org/W114757832","https://openalex.org/W755522289","https://openalex.org/W1482922493","https://openalex.org/W1554865288","https://openalex.org/W1689385595","https://openalex.org/W1727535721","https://openalex.org/W1744216657","https://openalex.org/W1810232834","https://openalex.org/W1826962815","https://openalex.org/W1839208868","https://openalex.org/W1884480624","https://openalex.org/W1923519637","https://openalex.org/W2064939672","https://openalex.org/W2080956839","https://openalex.org/W2102210446","https://openalex.org/W2130574782","https://openalex.org/W2131642892","https://openalex.org/W2134553300","https://openalex.org/W2152688060","https://openalex.org/W2185381909","https://openalex.org/W2240009439","https://openalex.org/W2402158772","https://openalex.org/W2477309039","https://openalex.org/W2499503922","https://openalex.org/W2739825077","https://openalex.org/W3029026042","https://openalex.org/W3090211759","https://openalex.org/W3091546435","https://openalex.org/W3217479319","https://openalex.org/W4238341678","https://openalex.org/W4313347210"],"related_works":["https://openalex.org/W2964609758","https://openalex.org/W2910464690","https://openalex.org/W2807501579","https://openalex.org/W3011345142","https://openalex.org/W2134038088","https://openalex.org/W1638546798","https://openalex.org/W2117179505","https://openalex.org/W4390979909","https://openalex.org/W2156908834","https://openalex.org/W4389575897"],"abstract_inverted_index":{"At":[0],"EUROCRYPT":[1],"2015,":[2],"Cogliati":[3],"and":[4,18],"Seurin":[5],"proved":[6],"that":[7,71],"the":[8,44,55,59,67,72,137],"4-round":[9,73],"Iterated":[10],"Even-Mansour":[11],"(IEM)":[12],"cipher":[13,75],"with":[14,102],"Independent":[15],"random":[16],"Permutations":[17],"no":[19],"key":[20],"schedule":[21],"EMIP4(k,":[22],"u)":[23,78],"=":[24,79,87],"k\u2295p4":[25],"(":[26,28],"k\u2295p3":[27],"k\u2295p2":[29],"(k\u2295p1":[30],"(k\u2295u))))":[31],"is":[32,105,136],"sequentially":[33,106],"indifferentiable":[34,107],"from":[35,108],"an":[36,92,109],"ideal":[37,110],"cipher,":[38],"which":[39],"implies":[40],"chosen-key":[41],"security":[42],"in":[43],"sense":[45],"of":[46],"correlation":[47],"intractability.":[48],"In":[49],"practice,":[50],"however,":[51],"blockciphers":[52,142],"such":[53],"as":[54],"AES":[56],"typically":[57],"employ":[58],"same":[60],"permutation":[61,94],"at":[62],"each":[63],"round.":[64],"To":[65,132],"bridge":[66],"gap,":[68],"we":[69],"prove":[70],"IEM":[74],"EMSP[\u03c6]p4":[76],"(k,":[77],"k4\u2295p":[80],"(k3\u2295p":[81],"(k2\u2295p(k1\u2295p(k0\u2295u)))),":[82],"whose":[83],"round":[84,145],"keys":[85],"ki":[86],"\u03c6i(k)":[88],"are":[89],"derived":[90],"using":[91,129,143],"affine":[93],"\u03c6":[95,114],":":[96],"{0,":[97,100],"1}n":[98,101],"\u2192":[99],"certain":[103],"properties,":[104],"cipher.":[111],"The":[112],"function":[113],"can":[115],"be":[116],"a":[117,128],"linear":[118],"orthomorphism,":[119],"or":[120],"\u03c6(k)":[121],":=":[122],"k\u226ba":[123],"for":[124,141],"some":[125],"fixed":[126],"integer":[127],"cyclic":[130],"shift.":[131],"our":[133],"knowledge,":[134],"this":[135],"first":[138],"indifferentiability-type":[139],"result":[140],"identical":[144],"functions.":[146]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
