{"id":"https://openalex.org/W4417433676","doi":"https://doi.org/10.46586/tosc.v2025.i4.70-124","title":"Dialga: A Family of Low-Latency Tweakable Block Ciphers Using Multiple Linear Layers","display_name":"Dialga: A Family of Low-Latency Tweakable Block Ciphers Using Multiple Linear Layers","publication_year":2025,"publication_date":"2025-12-17","ids":{"openalex":"https://openalex.org/W4417433676","doi":"https://doi.org/10.46586/tosc.v2025.i4.70-124"},"language":"en","primary_location":{"id":"doi:10.46586/tosc.v2025.i4.70-124","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2025.i4.70-124","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12612/12319","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12612/12319","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005140945","display_name":"Subhadeep Banik","orcid":"https://orcid.org/0000-0001-6310-0154"},"institutions":[{"id":"https://openalex.org/I57201433","display_name":"Universit\u00e0 della Svizzera italiana","ror":"https://ror.org/03c4atk17","country_code":"CH","type":"education","lineage":["https://openalex.org/I57201433"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Subhadeep Banik","raw_affiliation_strings":["University of Lugano, Lugano, Switzerland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Lugano, Lugano, Switzerland","institution_ids":["https://openalex.org/I57201433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109215055","display_name":"Ishikawa Tatsuya","orcid":null},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"The University of Osaka","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tatsuya Ishikawa","raw_affiliation_strings":["The University of Osaka, Suita, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of Osaka, Suita, Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056480052","display_name":"Takanori Isobe","orcid":"https://orcid.org/0000-0003-4253-5567"},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"The University of Osaka","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takanori Isobe","raw_affiliation_strings":["The University of Osaka, Suita, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of Osaka, Suita, Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029704779","display_name":"Ryoma Ito","orcid":"https://orcid.org/0000-0002-4929-8974"},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"The University of Osaka","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryoma Ito","raw_affiliation_strings":["The University of Osaka, Suita, Japan; NICT, Koganei, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of Osaka, Suita, Japan; NICT, Koganei, Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021671673","display_name":"Kazuhiko Minematsu","orcid":"https://orcid.org/0000-0002-3427-6772"},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuhiko Minematsu","raw_affiliation_strings":["NEC, Kawasaki, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"NEC, Kawasaki, Japan","institution_ids":["https://openalex.org/I118347220"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kazuma Nakata","orcid":null},"institutions":[{"id":"https://openalex.org/I180941496","display_name":"University of Hyogo","ror":"https://ror.org/0151bmh98","country_code":"JP","type":"education","lineage":["https://openalex.org/I180941496"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuma Nakata","raw_affiliation_strings":["University of Hyogo, Kobe, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Hyogo, Kobe, Japan","institution_ids":["https://openalex.org/I180941496"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054077729","display_name":"Mostafizar Rahman","orcid":"https://orcid.org/0000-0003-0934-4769"},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mostafizar Rahman","raw_affiliation_strings":["Kyoto University, Kyoto, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Kyoto University, Kyoto, Japan","institution_ids":["https://openalex.org/I22299242"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008561889","display_name":"Kosei Sakamoto","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133125","display_name":"Mitsubishi Electric (Japan)","ror":"https://ror.org/033y26782","country_code":"JP","type":"company","lineage":["https://openalex.org/I1306287861","https://openalex.org/I4210133125"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kosei Sakamoto","raw_affiliation_strings":["The University of Osaka, Suita, Japan; Mitsubishi Electric Corporation, Kamakura, Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of Osaka, Suita, Japan; Mitsubishi Electric Corporation, Kamakura, Japan","institution_ids":["https://openalex.org/I4210133125"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5005140945"],"corresponding_institution_ids":["https://openalex.org/I57201433"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20441615,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2025","issue":"4","first_page":"70","last_page":"124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.006899999920278788,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.7802000045776367},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6758000254631042},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.5112000107765198},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5085999965667725},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.46630001068115234},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4618000090122223},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.4487999975681305},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4205999970436096}],"concepts":[{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.7802000045776367},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6955000162124634},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6758000254631042},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.5112000107765198},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5085999965667725},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.46630001068115234},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4618000090122223},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.4487999975681305},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4205999970436096},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4090000092983246},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4032999873161316},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3984000086784363},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.37619999051094055},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.3718999922275543},{"id":"https://openalex.org/C65682993","wikidata":"https://www.wikidata.org/wiki/Q1056451","display_name":"Reflection (computer programming)","level":2,"score":0.3555999994277954},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.33399999141693115},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.31310001015663147},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.30979999899864197},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.3059999942779541},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2946999967098236},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.2939999997615814},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2847999930381775},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.2720000147819519},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.26570001244544983},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.259799987077713},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2563999891281128},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.25189998745918274}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tosc.v2025.i4.70-124","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2025.i4.70-124","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12612/12319","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:60ff45f93e0a46358a871164d69b5620","is_oa":true,"landing_page_url":"https://doaj.org/article/60ff45f93e0a46358a871164d69b5620","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2025, Iss 4 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tosc.v2025.i4.70-124","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2025.i4.70-124","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12612/12319","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309030","display_name":"Small Business Innovation Research","ror":"https://ror.org/015t55b95"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417433676.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,85],"propose":[4],"Dialga,":[5],"a":[6,87,123,136],"family":[7],"of":[8,35,61,80,131],"low-latency":[9],"tweakable":[10],"block":[11],"ciphers":[12],"designed":[13],"to":[14,75],"support":[15],"128/256-bit":[16],"tweaks":[17],"and":[18,48,99,103,119],"256-bit":[19],"keys.":[20],"Dialga":[21,118,125],"achieves":[22,126],"significantly":[23],"small":[24],"latency":[25],"by":[26,71],"leveraging":[27],"multiple":[28,36],"novel":[29],"strategies.":[30],"These":[31],"include":[32],"the":[33,58,78,81,96,109,129,142],"use":[34],"linear":[37,49],"layers":[38],"with":[39,51,141],"efficient":[40],"cell":[41],"permutations,":[42],"which":[43],"enhance":[44],"security":[45,94],"against":[46],"differential":[47],"attacks":[50],"negligible":[52],"hardware":[53,115],"overhead.":[54],"We":[55,112],"also":[56],"identify":[57],"optimal":[59],"choice":[60],"S-boxes":[62],"for":[63,101],"these":[64],"permutations":[65],"using":[66],"state-ofthe-":[67],"art":[68],"evaluation":[69],"methods":[70],"SAT,":[72],"enabling":[73],"us":[74],"further":[76],"reduce":[77],"delay":[79,106,130],"round":[82],"function.":[83],"Besides,":[84],"design":[86],"reflection":[88],"tweakey":[89],"schedule":[90],"that":[91],"ensures":[92],"strong":[93],"in":[95,139],"related-tweak":[97],"setting":[98],"allows":[100],"encryption":[102],"decryption":[104],"without":[105],"overhead,":[107],"reducing":[108],"circuit":[110],"area.":[111],"conducted":[113],"comprehensive":[114],"benchmarks":[116],"involving":[117],"other":[120],"primitives.":[121],"As":[122],"result,":[124],"nearly":[127],"half":[128],"QARMAv2,":[132],"while":[133],"achieving":[134],"approximately":[135],"40%":[137],"reduction":[138],"area,":[140],"same":[143],"claimed":[144],"security.":[145]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-12-17T00:00:00"}
