{"id":"https://openalex.org/W7119510343","doi":"https://doi.org/10.62056/a33zzo-3y","title":"New Records for Practical-data Chosen-plaintext Attacks on Round-reduced AES","display_name":"New Records for Practical-data Chosen-plaintext Attacks on Round-reduced AES","publication_year":2026,"publication_date":"2026-01-08","ids":{"openalex":"https://openalex.org/W7119510343","doi":"https://doi.org/10.62056/a33zzo-3y"},"language":"en","primary_location":{"id":"doi:10.62056/a33zzo-3y","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a33zzo-3y","pdf_url":"https://cic.iacr.org/p/2/4/38/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/2/4/38/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079852188","display_name":"Zhenzhen Bao","orcid":"https://orcid.org/0000-0003-2839-6687"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenzhen Bao","raw_affiliation_strings":["Institute for Network Sciences and Cyberspace, Tsinghua University","State Key Laboratory of Cryptography and Digital Economy Security, Tsinghua University","Zhongguancun Laboratory"],"affiliations":[{"raw_affiliation_string":"Institute for Network Sciences and Cyberspace, Tsinghua University","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"State Key Laboratory of Cryptography and Digital Economy Security, Tsinghua University","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Zhongguancun Laboratory","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122317648","display_name":"Jian Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jian Guo","raw_affiliation_strings":["Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035138461","display_name":"Eik List","orcid":"https://orcid.org/0000-0003-0369-4901"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Eik List","raw_affiliation_strings":["Nanyang Technological University"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5122342316","display_name":"Haoyang Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyang Wang","raw_affiliation_strings":["School of Computer Science, Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079852188"],"corresponding_institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06027953,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.0019000000320374966,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.42969998717308044},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.3709999918937683},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.33480000495910645},{"id":"https://openalex.org/keywords/margin","display_name":"Margin (machine learning)","score":0.32670000195503235},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.29490000009536743},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.28349998593330383}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6624000072479248},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6432999968528748},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.42969998717308044},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3709999918937683},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.33480000495910645},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.32670000195503235},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.29490000009536743},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.28349998593330383},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.2800000011920929},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2628999948501587},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.25369998812675476},{"id":"https://openalex.org/C89694405","wikidata":"https://www.wikidata.org/wiki/Q7540343","display_name":"Slide attack","level":5,"score":0.2517000138759613}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/a33zzo-3y","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a33zzo-3y","pdf_url":"https://cic.iacr.org/p/2/4/38/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/a33zzo-3y","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a33zzo-3y","pdf_url":"https://cic.iacr.org/p/2/4/38/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3085993365","display_name":null,"funder_award_id":"(Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5106512922","display_name":null,"funder_award_id":"Deutsche Forschungsgemeinschaft (DFG","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6330607538","display_name":null,"funder_award_id":"23022","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8452975911","display_name":null,"funder_award_id":"509754807","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322392","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W7119510343.pdf"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W76721308","https://openalex.org/W392155942","https://openalex.org/W1409313141","https://openalex.org/W1515595447","https://openalex.org/W1527814980","https://openalex.org/W1544447866","https://openalex.org/W1565705707","https://openalex.org/W1571067952","https://openalex.org/W1576070627","https://openalex.org/W1598147411","https://openalex.org/W1901931695","https://openalex.org/W2090921898","https://openalex.org/W2109265351","https://openalex.org/W2119874003","https://openalex.org/W2139747141","https://openalex.org/W2190250725","https://openalex.org/W2257504697","https://openalex.org/W2496427131","https://openalex.org/W2526746542","https://openalex.org/W2575957737","https://openalex.org/W2585018408","https://openalex.org/W2591966525","https://openalex.org/W2769426629","https://openalex.org/W2794564374","https://openalex.org/W2883079933","https://openalex.org/W2898254287","https://openalex.org/W2951744129","https://openalex.org/W2954435843","https://openalex.org/W2954468923","https://openalex.org/W2982416332","https://openalex.org/W2990731611","https://openalex.org/W3008985765","https://openalex.org/W3027260415","https://openalex.org/W3097879097","https://openalex.org/W3132724916","https://openalex.org/W4281830351","https://openalex.org/W4313347191","https://openalex.org/W4365807251","https://openalex.org/W4388970896","https://openalex.org/W4390689249","https://openalex.org/W4392792322","https://openalex.org/W4394930591","https://openalex.org/W4396657256"],"related_works":[],"abstract_inverted_index":{"As":[0],"probably":[1],"the":[2,7,18,28,31,38,48,69,73,84,92,105,116,130,138,165,179,182],"most":[3,34],"widespread":[4],"block":[5],"cipher,":[6],"AES":[8,44,166,184],"has":[9],"attracted":[10],"tremendous":[11],"cryptanalytical":[12],"efforts":[13],"since":[14],"its":[15],"standardization.":[16],"In":[17,141],"single":[19],"secret-key":[20],"setting,":[21],"Demirci-Selcuk":[22],"Meet-in-the-Middle":[23],"(DS-MitM)":[24],"attacks":[25,79,124,160,175],"have":[26,37],"remained":[27],"state":[29],"of":[30,151,164,181,190],"art":[32],"on":[33,42,68,77,88,107,125,134,161],"rounds":[35],"and":[36,61,63,118,127,133],"lowest":[39],"time":[40],"complexities":[41],"all":[43,135,162],"versions.":[45],"However,":[46],"after":[47],"research":[49],"intensity":[50],"had":[51],"peaked":[52],"with":[53,167],"Derbez":[54],"et":[55,65,101,148],"al.'s":[56,66,149],"seminal":[57],"works":[58,82],"from":[59],"Eurocrypt'13":[60],"FSE'13":[62],"Li":[64],"improvements":[67],"AES-192":[70,126],"at":[71],"FSE'14,":[72],"generic":[74],"technical":[75],"evolution":[76],"DS-MitM":[78,108],"stagnated.":[80],"Subsequent":[81],"automated":[83],"technique":[85],"or":[86],"concentrated":[87],"ciphers":[89],"other":[90],"than":[91],"AES.":[93],"But":[94],"it":[95],"took":[96],"one":[97],"decade":[98],"until":[99],"Dong":[100,147],"al.":[102],"(DCC'24)":[103],"advanced":[104],"progress":[106],"attacks.":[109],"Their":[110],"approach":[111],"uses":[112],"constraints":[113,152],"in":[114,129,137],"both":[115],"offline":[117],"online":[119],"phases,":[120],"which":[121],"produced":[122],"improved":[123],"-256":[128],"chosen-plaintext":[131],"setting":[132],"versions":[136,163,185],"practical-data":[139],"setting.":[140],"this":[142],"work,":[143],"we":[144],"demonstrate":[145],"that":[146,173],"use":[150],"could":[153],"be":[154],"further":[155],"improved,":[156],"leading":[157],"to":[158],"better":[159],"practical":[168,195],"data":[169,196],"complexity.":[170],"We":[171],"emphasize":[172],"our":[174,188],"do":[176],"not":[177],"threaten":[178],"security":[180,192],"full":[183],"but":[186],"refine":[187],"understanding":[189],"their":[191],"margins":[193],"under":[194],"settings.":[197]},"counts_by_year":[],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2026-01-09T00:00:00"}
