{"id":"https://openalex.org/W2921203182","doi":"https://doi.org/10.5220/0007249000380043","title":"Zero-sum Distinguishers for Round-reduced GIMLI Permutation","display_name":"Zero-sum Distinguishers for Round-reduced GIMLI Permutation","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2921203182","doi":"https://doi.org/10.5220/0007249000380043","mag":"2921203182"},"language":"en","primary_location":{"id":"doi:10.5220/0007249000380043","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007249000380043","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0007249000380043","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109466433","display_name":"Jiahao Cai","orcid":"https://orcid.org/0009-0003-0581-9349"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiahao Cai","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences and China, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences and China, --- Select a Country ---","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038","https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062126698","display_name":"Zihao Wei","orcid":"https://orcid.org/0000-0002-5836-0282"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihao Wei","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences and China, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences and China, --- Select a Country ---","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038","https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100430945","display_name":"Yingjie Zhang","orcid":"https://orcid.org/0000-0001-9745-0558"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingjie Zhang","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences and China, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences and China, --- Select a Country ---","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038","https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027649882","display_name":"Siwei Sun","orcid":"https://orcid.org/0000-0002-3058-2377"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siwei Sun","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences and China, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences and China, --- Select a Country ---","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038","https://openalex.org/I4210126530"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034965387","display_name":"Lei Hu","orcid":"https://orcid.org/0000-0002-9920-5342"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Hu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences and China, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China, School of Cyber Security, University of Chinese Academy of Sciences and China, --- Select a Country ---","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038","https://openalex.org/I4210126530"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5109466433"],"corresponding_institution_ids":["https://openalex.org/I4210126530","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.7001,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77054455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"38","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.6666152477264404},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.6300193667411804},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4595576226711273},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.41581153869628906},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.14274096488952637},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.0871119499206543},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.06731423735618591}],"concepts":[{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.6666152477264404},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.6300193667411804},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4595576226711273},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.41581153869628906},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.14274096488952637},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0871119499206543},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.06731423735618591},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0007249000380043","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007249000380043","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0007249000380043","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007249000380043","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1979597421","https://openalex.org/W2007980826","https://openalex.org/W4245490552","https://openalex.org/W4225152035","https://openalex.org/W2061531152","https://openalex.org/W3002753104","https://openalex.org/W2077600819","https://openalex.org/W1587224694"],"abstract_inverted_index":{"GIMLI":[0,37,67,80],"is":[1,14,50,68],"a":[2,28,42],"384-bit":[3],"permutation":[4],"proposed":[5],"by":[6,94],"Bernstein":[7],"et":[8],"al.":[9],"at":[10],"CHES":[11],"2017.":[12],"It":[13],"designed":[15],"with":[16,81],"the":[17,58,82,90,95,110],"goal":[18],"of":[19,31,60,66,113],"achieving":[20],"both":[21],"high":[22,25],"security":[23],"and":[24,33],"performance":[26],"across":[27],"wide":[29],"range":[30],"hardware":[32],"software":[34],"platforms.":[35],"Since":[36],"can":[38],"be":[39],"used":[40],"as":[41],"building":[43],"block":[44],"for":[45,78],"many":[46],"cryptographic":[47],"schemes,":[48],"it":[49],"important":[51],"to":[52],"understand":[53],"its":[54],"concrete":[55],"security.":[56],"To":[57],"best":[59],"our":[61],"knowledge,":[62],"third":[63],"party":[64],"cryptanalysis":[65,101],"limited.":[69],"In":[70],"this":[71],"paper,":[72],"we":[73,98],"identify":[74],"some":[75],"zero-sum":[76,104],"distinguishers":[77,92,105],"14-round":[79],"inside-out":[83],"technique,":[84],"which":[85],"are":[86,106],"one-round":[87],"longer":[88],"than":[89],"integral":[91],"presented":[93],"designers.":[96],"Although":[97],"obtain":[99],"improved":[100],"results,":[102],"these":[103],"far":[107],"from":[108],"threatening":[109],"full":[111],"version":[112],"GIMLI.":[114]},"counts_by_year":[{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
