{"id":"https://openalex.org/W7136738304","doi":"https://doi.org/10.46586/tosc.v2026.i1.293-317","title":"Differential-Linear Cryptanalysis and Cube Attacks on ChiLow","display_name":"Differential-Linear Cryptanalysis and Cube Attacks on ChiLow","publication_year":2026,"publication_date":"2026-03-16","ids":{"openalex":"https://openalex.org/W7136738304","doi":"https://doi.org/10.46586/tosc.v2026.i1.293-317"},"language":"en","primary_location":{"id":"doi:10.46586/tosc.v2026.i1.293-317","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2026.i1.293-317","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12787/12476","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12787/12476","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041471885","display_name":"Cheng Che","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Cheng Che","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129403882","display_name":"Tian Tian","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Tian","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041471885"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.84589579,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2026","issue":"1","first_page":"293","last_page":"317"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0020000000949949026,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.0019000000320374966,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.652899980545044},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.6395000219345093},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.5127999782562256},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5005999803543091},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.49549999833106995},{"id":"https://openalex.org/keywords/slide-attack","display_name":"Slide attack","score":0.4894999861717224},{"id":"https://openalex.org/keywords/time-complexity","display_name":"Time complexity","score":0.37459999322891235},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3662000000476837}],"concepts":[{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.652899980545044},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.6395000219345093},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6128000020980835},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.5127999782562256},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5005999803543091},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.49549999833106995},{"id":"https://openalex.org/C89694405","wikidata":"https://www.wikidata.org/wiki/Q7540343","display_name":"Slide attack","level":5,"score":0.4894999861717224},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44209998846054077},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.37459999322891235},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3662000000476837},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.3447999954223633},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3416999876499176},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.3361999988555908},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.2906999886035919},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26910001039505005},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.2669000029563904},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.2630999982357025},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.26159998774528503},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.2587999999523163},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2524000108242035}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tosc.v2026.i1.293-317","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2026.i1.293-317","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12787/12476","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9ea16541cb9c48ceb9dfa28e29229da1","is_oa":true,"landing_page_url":"https://doaj.org/article/9ea16541cb9c48ceb9dfa28e29229da1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2026, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tosc.v2026.i1.293-317","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2026.i1.293-317","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12787/12476","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.9090170860290527,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6490523223","display_name":null,"funder_award_id":"62372464","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7136738304.pdf","grobid_xml":"https://content.openalex.org/works/W7136738304.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"ChiLow":[0,43,81,131,180,217],"is":[1],"a":[2,24,39,149,186,192],"family":[3],"of":[4,26,42,47,95,112,152,157,189,195,200,204,216],"tweakable":[5],"block":[6],"ciphers":[7,225],"specifically":[8],"designed":[9],"for":[10,100,159,164,170,222],"embedded":[11,227],"code":[12],"encryption,":[13],"proposed":[14],"at":[15],"EUROCRYPT":[16],"2025.":[17],"Its":[18],"novel":[19],"nested":[20],"tweakkey":[21],"schedule":[22],"and":[23,33,50,92,162,191,218],"variant":[25],"the":[27,45,57,63,89,96,109,137,142,167,198,201,213],"\u03c7":[28],"function":[29],"significantly":[30],"enhance":[31],"latency":[32],"energy":[34],"efficiency.":[35],"This":[36],"paper":[37],"presents":[38],"security":[40,59,214],"analysis":[41,60],"from":[44,82],"perspectives":[46],"differential-linear":[48,75,134],"cryptanalysis":[49,76,135],"cube":[51,183],"attacks,":[52,184],"filling":[53],"some":[54,209],"gaps":[55],"in":[56,226],"initial":[58],"made":[61],"by":[62],"designers.":[64],"Our":[65],"main":[66],"contributions":[67],"are":[68,98,104,116],"threefold:":[69],"(1)":[70],"Distinguishing":[71],"attacks":[72,115,128,147],"based":[73,132,181],"on":[74,129,133,178,182,212],"that":[77,108],"can":[78],"distinguish":[79],"full-round":[80,130],"random":[83],"permutations.":[84],"For":[85],"ChiLow-(32+\u03c4":[86,160],"),":[87],"both":[88,102],"time":[90,138,150,187],"complexity":[91,94,139,151,188,194],"data":[93,110,155,168,193],"attack":[97,177],"281.03;":[99],"ChiLow-40,":[101],"complexities":[103,111,156],"288.91.":[105],"We":[106],"note":[107],"these":[113],"distinguishing":[114],"valid":[117],"since":[118],"an":[119],"adversary":[120],"could":[121],"query":[122],"multiple":[123],"devices.":[124],"(2)":[125],"Key":[126],"recovery":[127,176],"with":[136,154,185],"better":[140],"than":[141],"exhaustive":[143],"key":[144,175],"search.":[145],"These":[146,206],"achieve":[148],"2121,":[153],"279.5":[158],")":[161],"288.42":[163],"ChiLow-40":[165],"exceeding":[166],"limit":[169,199],"one":[171],"key.":[172],"(3)":[173],"A":[174],"6-round":[179],"268":[190],"233":[196],"respecting":[197],"total":[202],"number":[203],"queries.":[205],"results":[207],"shed":[208],"new":[210],"light":[211],"boundaries":[215],"provide":[219],"valuable":[220],"insights":[221],"designing":[223],"low-latency":[224],"systems.":[228]},"counts_by_year":[],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2026-03-17T00:00:00"}
