{"id":"https://openalex.org/W4414528030","doi":"https://doi.org/10.46586/tosc.v2025.i3.577-632","title":"SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis","display_name":"SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis","publication_year":2025,"publication_date":"2025-09-25","ids":{"openalex":"https://openalex.org/W4414528030","doi":"https://doi.org/10.46586/tosc.v2025.i3.577-632"},"language":"en","primary_location":{"id":"doi:10.46586/tosc.v2025.i3.577-632","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2025.i3.577-632","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12480/12193","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12480/12193","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100691558","display_name":"Guozhen Liu","orcid":"https://orcid.org/0000-0002-0556-6404"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guozhen Liu","raw_affiliation_strings":["School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100442633","display_name":"Shun Li","orcid":"https://orcid.org/0000-0002-3629-9900"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shun Li","raw_affiliation_strings":["School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075205795","display_name":"Huina Li","orcid":"https://orcid.org/0000-0001-7965-5613"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huina Li","raw_affiliation_strings":["Tsinghua University, Beijing, 100084, China; Shanghai Jiao Tong University, Shanghai, 200240, China","Tsinghua University, Beijing, 100084, China","Shanghai Jiao Tong University, Shanghai, 200240, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, 100084, China; Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Tsinghua University, Beijing, 100084, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088072972","display_name":"Weidong Qiu","orcid":"https://orcid.org/0000-0001-6428-1655"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weidong Qiu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, 200240, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027649882","display_name":"Siwei Sun","orcid":"https://orcid.org/0000-0002-3058-2377"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siwei Sun","raw_affiliation_strings":["School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Cryptology, University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100691558"],"corresponding_institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12980053,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2025","issue":"3","first_page":"577","last_page":"632"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9639000296592712,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9639000296592712,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9509000182151794,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9424999952316284,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collision","display_name":"Collision","score":0.6517000198364258},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6445000171661377},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.5220000147819519},{"id":"https://openalex.org/keywords/space-partitioning","display_name":"Space partitioning","score":0.46470001339912415},{"id":"https://openalex.org/keywords/collision-attack","display_name":"Collision attack","score":0.44679999351501465},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.42890000343322754}],"concepts":[{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.6517000198364258},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6445000171661377},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5667999982833862},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5508000254631042},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.5220000147819519},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4731000065803528},{"id":"https://openalex.org/C13670688","wikidata":"https://www.wikidata.org/wiki/Q3500548","display_name":"Space partitioning","level":2,"score":0.46470001339912415},{"id":"https://openalex.org/C87538441","wikidata":"https://www.wikidata.org/wiki/Q389463","display_name":"Collision attack","level":5,"score":0.44679999351501465},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.42890000343322754},{"id":"https://openalex.org/C201789804","wikidata":"https://www.wikidata.org/wiki/Q2362762","display_name":"Search problem","level":2,"score":0.4032000005245209},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.3959999978542328},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.37369999289512634},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.35569998621940613},{"id":"https://openalex.org/C125583679","wikidata":"https://www.wikidata.org/wiki/Q755673","display_name":"Search algorithm","level":2,"score":0.3443000018596649},{"id":"https://openalex.org/C115908005","wikidata":"https://www.wikidata.org/wiki/Q2668364","display_name":"Combinatorial explosion","level":2,"score":0.2655999958515167}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tosc.v2025.i3.577-632","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2025.i3.577-632","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12480/12193","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9fb85f9a0c2244779e572362c105e43f","is_oa":true,"landing_page_url":"https://doaj.org/article/9fb85f9a0c2244779e572362c105e43f","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2025, Iss 3 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tosc.v2025.i3.577-632","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2025.i3.577-632","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12480/12193","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4718534038","display_name":null,"funder_award_id":"2022YFB2701900","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5467697000","display_name":null,"funder_award_id":"62032014","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6570358915","display_name":null,"funder_award_id":"2024M753187","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G7735407926","display_name":null,"funder_award_id":"62032014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414528030.pdf","grobid_xml":"https://content.openalex.org/works/W4414528030.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"We":[0,91,135],"introduce":[1],"an":[2,56,83],"efficient":[3],"SAT-based":[4],"space":[5],"partitioning":[6],"technique":[7,124],"that":[8,64,99],"enables":[9],"systematic":[10],"exploration":[11],"of":[12,34,48,59],"large":[13],"search":[14,22,39,58,128],"spaces":[15,23],"in":[16],"cryptanalysis.":[17],"The":[18],"approach":[19],"divides":[20],"complex":[21],"into":[24],"manageable":[25],"subsets":[26],"through":[27,45],"combinatorial":[28],"necklace":[29],"generation,":[30],"allowing":[31],"precise":[32],"tracking":[33],"explored":[35],"regions":[36],"while":[37],"maintaining":[38],"completeness.We":[40],"demonstrate":[41],"the":[42,111,123,137,153],"technique\u2019s":[43],"effectiveness":[44],"extensive":[46],"cryptanalysis":[47],"Ascon-Hash256.":[49,134],"For":[50],"differential-based":[51],"collision":[52,61,66,86,97,138],"attacks,":[53],"we":[54,81],"conduct":[55],"exhaustive":[57],"2-round":[60,85],"trails,":[62],"proving":[63],"no":[65],"trail":[67,116],"with":[68,88,145,161],"weight":[69,118],"less":[70],"than":[71],"156":[72],"exists.":[73],"Through":[74],"detailed":[75],"complexity":[76,89,140,147,156,163],"analysis":[77],"and":[78,106,152],"parameter":[79],"optimization,":[80],"present":[82],"improved":[84,130],"attack":[87,139,155],"261.79.":[90],"also":[92],"discover":[93],"new":[94],"Semi-Free-Start":[95],"(SFS)":[96],"trails":[98],"enable":[100],"practical":[101],"attacks":[102,131],"on":[103,132],"both":[104],"3-round":[105,133],"4-round":[107,114],"Ascon-Hash256,":[108],"especially":[109],"improving":[110],"best":[112],"known":[113],"SFS":[115],"from":[117,141,150,157,166],"295":[119],"to":[120,125,143,159],"250.Furthermore,":[121],"applying":[122],"Meet-in-the-Middle":[126],"structure":[127],"yields":[129],"reduce":[136],"2116.74":[142],"2114.13":[144],"memory":[146,162],"2112":[148],"(improved":[149,165],"2116),":[151],"preimage":[154],"2162.80":[158],"2160.75":[160],"2160":[164],"2162).":[167]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
