{"id":"https://openalex.org/W4409253658","doi":"https://doi.org/10.62056/a6ksdk5vt","title":"Construction of Hadamard-based MixColumns Matrices Resistant to Related-Differential Cryptanalysis","display_name":"Construction of Hadamard-based MixColumns Matrices Resistant to Related-Differential Cryptanalysis","publication_year":2025,"publication_date":"2025-04-08","ids":{"openalex":"https://openalex.org/W4409253658","doi":"https://doi.org/10.62056/a6ksdk5vt"},"language":"en","primary_location":{"id":"doi:10.62056/a6ksdk5vt","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a6ksdk5vt","pdf_url":null,"source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.62056/a6ksdk5vt","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117073737","display_name":"Sonu Jha","orcid":"https://orcid.org/0000-0003-4584-3194"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Sonu Jha","raw_affiliation_strings":["Norwegian University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Norwegian University of Science and Technology","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100442637","display_name":"Shun Li","orcid":"https://orcid.org/0000-0002-7663-8321"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shun Li","raw_affiliation_strings":["Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011632840","display_name":"Danilo Gligoroski","orcid":"https://orcid.org/0000-0002-7078-6139"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Danilo Gligoroski","raw_affiliation_strings":["Norwegian University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Norwegian University of Science and Technology","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5117073737"],"corresponding_institution_ids":["https://openalex.org/I204778367"],"apc_list":null,"apc_paid":null,"fwci":2.8414,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9017931,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"2","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hadamard-transform","display_name":"Hadamard transform","score":0.6823025345802307},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.61226487159729},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.597675085067749},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5664145946502686},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.5616598129272461},{"id":"https://openalex.org/keywords/higher-order-differential-cryptanalysis","display_name":"Higher-order differential cryptanalysis","score":0.5141242146492004},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.49392324686050415},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.48516350984573364},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4708276093006134},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3754895329475403},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.35680967569351196},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2485751509666443},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.2308782935142517},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17044231295585632},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.15609785914421082}],"concepts":[{"id":"https://openalex.org/C60292330","wikidata":"https://www.wikidata.org/wiki/Q1014065","display_name":"Hadamard transform","level":2,"score":0.6823025345802307},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.61226487159729},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.597675085067749},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5664145946502686},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.5616598129272461},{"id":"https://openalex.org/C151607707","wikidata":"https://www.wikidata.org/wiki/Q11673206","display_name":"Higher-order differential cryptanalysis","level":5,"score":0.5141242146492004},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.49392324686050415},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.48516350984573364},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4708276093006134},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3754895329475403},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.35680967569351196},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2485751509666443},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.2308782935142517},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17044231295585632},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.15609785914421082},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/a6ksdk5vt","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a6ksdk5vt","pdf_url":null,"source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/a6ksdk5vt","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a6ksdk5vt","pdf_url":null,"source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W35428663","https://openalex.org/W66229595","https://openalex.org/W98521887","https://openalex.org/W139683999","https://openalex.org/W1572300106","https://openalex.org/W1606480398","https://openalex.org/W2023158465","https://openalex.org/W2141124495","https://openalex.org/W2242540160","https://openalex.org/W2409722729","https://openalex.org/W2476021812","https://openalex.org/W2500084106","https://openalex.org/W2503098516","https://openalex.org/W2505213174","https://openalex.org/W2572813892","https://openalex.org/W2594061018","https://openalex.org/W2605101120","https://openalex.org/W2620219640","https://openalex.org/W2769426629","https://openalex.org/W2782157655","https://openalex.org/W2782477046","https://openalex.org/W2794903372","https://openalex.org/W2795253480","https://openalex.org/W2795481033","https://openalex.org/W2919480248","https://openalex.org/W4281830351","https://openalex.org/W4289604192","https://openalex.org/W4400141161","https://openalex.org/W6922883031"],"related_works":["https://openalex.org/W2557174342","https://openalex.org/W4230315357","https://openalex.org/W57168481","https://openalex.org/W2791274315","https://openalex.org/W2950215720","https://openalex.org/W2560473362","https://openalex.org/W3123145532","https://openalex.org/W2083383916","https://openalex.org/W1598870173","https://openalex.org/W2593607592"],"abstract_inverted_index":{"In":[0],"this":[1,69],"paper,":[2],"we":[3,126],"study":[4],"MDS":[5,20,172,192],"matrices":[6,21,38,46,147,162,173],"that":[7,28,39,59,77],"are":[8],"specifically":[9],"designed":[10],"to":[11,32,72,104,108,132,197],"prevent":[12],"the":[13,48,57,61,94,97,109,135,164,189],"occurrence":[14],"of":[15,51,68,99,111,118,139,151,160,191],"related":[16,42,62,88,100,140],"differentials.":[17,43,89,113],"We":[18],"investigate":[19],"with":[22],"a":[23,80,128,158,184],"Hadamard":[24,37,85,146],"structure":[25],"and":[26],"demonstrate":[27],"it":[29],"is":[30,71],"possible":[31],"construct":[33],"4":[34,36,82,84],"X":[35,83,144],"effectively":[40],"eliminate":[41],"Incorporating":[44],"these":[45,92],"into":[47],"linear":[49],"layer":[50],"AES-like":[52],"block-ciphers/hash":[53],"functions":[54],"significantly":[55],"mitigates":[56],"attacks":[58,121],"exploit":[60],"differentials":[63,141],"property.":[64],"The":[65],"central":[66],"contribution":[67],"paper":[70],"identify":[73],"crucial":[74],"underlying":[75],"relations":[76],"determine":[78],"whether":[79],"given":[81],"matrix":[86,95,193],"exhibits":[87],"By":[90],"satisfying":[91],"relations,":[93],"ensures":[96],"presence":[98,136],"differentials,":[101],"whereas":[102],"failing":[103],"meet":[105],"them":[106],"leads":[107],"absence":[110,138],"such":[112],"This":[114],"offers":[115],"effective":[116],"mitigation":[117],"recently":[119],"reported":[120],"on":[122,170,176],"reduced-round":[123],"AES.":[124],"Furthermore,":[125],"propose":[127],"faster":[129],"search":[130],"technique":[131],"exhaustively":[133],"verify":[134],"or":[137],"in":[142,163,195],"8":[143,145],"over":[148],"finite":[149],"field":[150],"characteristic":[152],"2":[153],"which":[154],"requires":[155],"checking":[156],"only":[157],"subset":[159],"involutory":[161],"set.":[165],"Although":[166],"most":[167],"existing":[168],"studies":[169],"constructing":[171],"primarily":[174],"focus":[175],"lightweight":[177],"hardware/software":[178],"implementations,":[179],"our":[180],"research":[181],"additionally":[182],"introduces":[183],"novel":[185],"perspective":[186],"by":[187],"emphasizing":[188],"importance":[190],"construction":[194],"relation":[196],"their":[198],"resistance":[199],"against":[200],"differential":[201],"cryptanalysis.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
