{"id":"https://openalex.org/W2074305260","doi":"https://doi.org/10.5220/0005064903990404","title":"Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon","display_name":"Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2074305260","doi":"https://doi.org/10.5220/0005064903990404","mag":"2074305260"},"language":"en","primary_location":{"id":"doi:10.5220/0005064903990404","is_oa":false,"landing_page_url":"https://doi.org/10.5220/0005064903990404","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085287860","display_name":"Nicolas T. Courtois","orcid":"https://orcid.org/0000-0003-0736-431X"},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nicolas Courtois","raw_affiliation_strings":["University College London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University College London, United Kingdom","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039586282","display_name":"Theodosis Mourouzis","orcid":null},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Theodosis Mourouzis","raw_affiliation_strings":["University College London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University College London, United Kingdom","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112365895","display_name":"Guangyan Song","orcid":null},"institutions":[{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Guangyan Song","raw_affiliation_strings":["University College London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University College London, United Kingdom","institution_ids":["https://openalex.org/I45129253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050676606","display_name":"Pouyan Sepehrdad","orcid":null},"institutions":[{"id":"https://openalex.org/I4210111675","display_name":"Market Matters","ror":"https://ror.org/021yan307","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210111675"]},{"id":"https://openalex.org/I4210087596","display_name":"Qualcomm (United States)","ror":"https://ror.org/002zrf773","country_code":"US","type":"company","lineage":["https://openalex.org/I4210087596"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pouyan Sepehrdad","raw_affiliation_strings":["Qualcomm Inc. San Diego, United States"],"affiliations":[{"raw_affiliation_string":"Qualcomm Inc. San Diego, United States","institution_ids":["https://openalex.org/I4210087596","https://openalex.org/I4210111675"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078991789","display_name":"Petr Su\u0161il","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Petr Susil","raw_affiliation_strings":["\u00c9cole Polytechnique F\u00e9d\u00e9reale de Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"\u00c9cole Polytechnique F\u00e9d\u00e9reale de Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5085287860"],"corresponding_institution_ids":["https://openalex.org/I45129253"],"apc_list":null,"apc_paid":null,"fwci":4.2201,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.94452615,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"399","last_page":"404"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7943428754806519},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.5580722689628601},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.557379961013794},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.43794816732406616},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.42800599336624146},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3932776153087616},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3833026587963104},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.37488657236099243},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3610239028930664},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35455527901649475},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2664303779602051}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7943428754806519},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.5580722689628601},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.557379961013794},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.43794816732406616},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.42800599336624146},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3932776153087616},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3833026587963104},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.37488657236099243},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3610239028930664},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35455527901649475},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2664303779602051},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0005064903990404","is_oa":false,"landing_page_url":"https://doi.org/10.5220/0005064903990404","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:1469754","is_oa":false,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/1469754/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"     In: Obaidat, MS and Holzinger, A and Samarati, P, (eds.) Proceedings of the 11th International Conference on Security and Cryptography (ICETE 2014).  (pp. pp. 399-404).  Science and Technology Publications: Vienna, Austria. (2014)     ","raw_type":"Proceedings paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W369300053","https://openalex.org/W1846574688","https://openalex.org/W1850083534","https://openalex.org/W2073407583","https://openalex.org/W2091423939","https://openalex.org/W2109394932","https://openalex.org/W2124509406","https://openalex.org/W2128687423","https://openalex.org/W2167275344","https://openalex.org/W2174154651","https://openalex.org/W2234576048","https://openalex.org/W2399532653","https://openalex.org/W2600785992","https://openalex.org/W2952842760","https://openalex.org/W3030624396","https://openalex.org/W3123523937","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W57168481","https://openalex.org/W2003194200","https://openalex.org/W2560473362","https://openalex.org/W1998022504","https://openalex.org/W2949235530","https://openalex.org/W1489035426","https://openalex.org/W2383171198","https://openalex.org/W1539170589","https://openalex.org/W4230315357","https://openalex.org/W4321354008"],"abstract_inverted_index":{"Recently,":[0],"two":[1],"families":[2],"of":[3,17,53,226,235,247],"ultra-lightweight":[4],"block":[5,18],"ciphers":[6,100,234,242],"were":[7],"proposed,":[8],"SIMON":[9],"and":[10,19,35,74,77,114,130,238],"SPECK,":[11],"which":[12,213],"come":[13],"in":[14,233],"a":[15,144,180,215,244],"variety":[16],"key":[20,207],"sizes":[21],"(Beaulieu":[22,38],"et":[23,39,43,70,82,86,148,157],"al.,":[24,40,44,71,83,87,149,158],"2013).":[25],"They":[26],"are":[27,101,171,220],"designed":[28],"to":[29,57,103,108,137,189,196,249],"offer":[30],"excellent":[31],"performance":[32],"for":[33,199],"hardware":[34],"software":[36],"implementations":[37],"2013;":[41,84],"Aysu":[42],"2014).":[45],"In":[46],"this":[47],"paper,":[48],"we":[49,135,202],"study":[50],"the":[51,90,95,122,128,139,224],"resistance":[52],"SIMON-64/128":[54],"with":[55,116,230],"respect":[56],"algebraic":[58,112,231],"attacks.":[59],"Its":[60],"round":[61],"function":[62],"has":[63],"very":[64,78,105],"low":[65,79,175,236],"Multiplicative":[66],"Complexity":[67],"(MC)":[68],"(Boyar":[69,81],"2000;":[72],"Boyar":[73],"Peralta,":[75],"2010)":[76],"non-linearity":[80,237],"Courtois":[85],"2011)":[88],"since":[89],"only":[91],"non-linear":[92],"component":[93],"is":[94,209],"bitwise":[96],"multiplication":[97],"operation.":[98],"Such":[99],"expected":[102],"be":[104,109,250],"good":[106],"candidates":[107],"broken":[110],"by":[111,121,152],"attacks":[113,232],"combinations":[115],"truncated":[117,182,217,228],"differentials":[118,229],"(additional":[119],"work":[120],"same":[123],"authors).":[124],"We":[125,160,187],"algebraically":[126],"encode":[127],"cipher":[129],"then":[131],"using":[132,142],"guess-then-determine":[133],"techniques,":[134],"try":[136],"solve":[138],"underlying":[140],"system":[141],"either":[143],"SAT":[145],"solver":[146],"(Bard":[147],"2007)":[150],"or":[151,178],"ElimLin":[153],"al":[154],"gorithm":[155],"(Courtois":[156],"2012b).":[159],"consider":[161],"several":[162],"settings":[163],"where":[164],"P-C":[165],"pairs":[166,212],"that":[167,240],"satisfy":[168,214],"certain":[169],"properties":[170],"available,":[172],"such":[173,241],"as":[174],"Hamming":[176],"distance":[177],"follow":[179],"strong":[181,216],"differential":[183,218],"property":[184,219],"(Knudsen,":[185],"1995).":[186],"manage":[188],"break":[190],"faster":[191],"than":[192],"brute":[193],"force":[194],"up":[195],"10(/44)":[197],"rounds":[198,248],"most":[200],"cases":[201],"have":[203],"tried.":[204],"Surprisingly,":[205],"no":[206],"guessing":[208],"required":[210],"if":[211],"available.":[221],"This":[222],"reflects":[223],"power":[225],"combining":[227],"shows":[239],"require":[243],"large":[245],"number":[246],"secure.":[251]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
