{"id":"https://openalex.org/W7119534581","doi":"https://doi.org/10.62056/av11c3c2h","title":"MSX: Lightweight Block Ciphers for Microcontrollers with High-assurance against Differential and Linear Attacks","display_name":"MSX: Lightweight Block Ciphers for Microcontrollers with High-assurance against Differential and Linear Attacks","publication_year":2026,"publication_date":"2026-01-08","ids":{"openalex":"https://openalex.org/W7119534581","doi":"https://doi.org/10.62056/av11c3c2h"},"language":"en","primary_location":{"id":"doi:10.62056/av11c3c2h","is_oa":true,"landing_page_url":"https://doi.org/10.62056/av11c3c2h","pdf_url":"https://cic.iacr.org/p/2/4/32/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/2/4/32/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021671673","display_name":"Kazuhiko Minematsu","orcid":"https://orcid.org/0000-0002-3427-6772"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kazuhiko Minematsu","raw_affiliation_strings":["NEC Corporation"],"affiliations":[{"raw_affiliation_string":"NEC Corporation","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108680903","display_name":"Tomoyasu Suzaki","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125264","display_name":"R2M Solution (Italy)","ror":"https://ror.org/0385et328","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210125264"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Tomoyasu Suzaki","raw_affiliation_strings":["NEC Solution Innovator"],"affiliations":[{"raw_affiliation_string":"NEC Solution Innovator","institution_ids":["https://openalex.org/I4210125264"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mostafizar Rahman","orcid":null},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mostafizar Rahman","raw_affiliation_strings":["Kyoto University"],"affiliations":[{"raw_affiliation_string":"Kyoto University","institution_ids":["https://openalex.org/I22299242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070403825","display_name":"Sahiba Suryawanshi","orcid":null},"institutions":[{"id":"https://openalex.org/I180941496","display_name":"University of Hyogo","ror":"https://ror.org/0151bmh98","country_code":"JP","type":"education","lineage":["https://openalex.org/I180941496"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Sahiba Suryawanshi","raw_affiliation_strings":["University of Hyogo"],"affiliations":[{"raw_affiliation_string":"University of Hyogo","institution_ids":["https://openalex.org/I180941496"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056480052","display_name":"Takanori Isobe","orcid":"https://orcid.org/0000-0003-4253-5567"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Takanori Isobe","raw_affiliation_strings":["The University of Osaka"],"affiliations":[{"raw_affiliation_string":"The University of Osaka","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021671673"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05898642,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9370999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9370999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.01850000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.012400000356137753,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6169000267982483},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.6057000160217285},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.5583999752998352},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5091000199317932},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.42010000348091125},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.41200000047683716},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.41190001368522644},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3991999924182892},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.3919999897480011}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6169000267982483},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.6057000160217285},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5633000135421753},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.5583999752998352},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5091000199317932},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.45910000801086426},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.42010000348091125},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.41749998927116394},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.41200000047683716},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.41190001368522644},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3991999924182892},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.3919999897480011},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.38179999589920044},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.3806999921798706},{"id":"https://openalex.org/C97137487","wikidata":"https://www.wikidata.org/wiki/Q729138","display_name":"Integer (computer science)","level":2,"score":0.37070000171661377},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.35040000081062317},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.34689998626708984},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.33399999141693115},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3240000009536743},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.3179999887943268},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.31610000133514404},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.31529998779296875},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.31360000371932983},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2858999967575073},{"id":"https://openalex.org/C89694405","wikidata":"https://www.wikidata.org/wiki/Q7540343","display_name":"Slide attack","level":5,"score":0.2646999955177307},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.2574000060558319},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/av11c3c2h","is_oa":true,"landing_page_url":"https://doi.org/10.62056/av11c3c2h","pdf_url":"https://cic.iacr.org/p/2/4/32/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/av11c3c2h","is_oa":true,"landing_page_url":"https://doi.org/10.62056/av11c3c2h","pdf_url":"https://cic.iacr.org/p/2/4/32/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7174407839775085}],"awards":[{"id":"https://openalex.org/G5056495607","display_name":"Exploring New Designs in Symmetric Cryptography Through a By-Design Approach and High-Resolution Analysis","funder_award_id":"24H00696","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7119534581.pdf","grobid_xml":"https://content.openalex.org/works/W7119534581.grobid-xml"},"referenced_works_count":90,"referenced_works":["https://openalex.org/W37385681","https://openalex.org/W45372631","https://openalex.org/W52191336","https://openalex.org/W62005486","https://openalex.org/W182571705","https://openalex.org/W369300053","https://openalex.org/W923715073","https://openalex.org/W930621015","https://openalex.org/W1271463297","https://openalex.org/W1485064528","https://openalex.org/W1496476314","https://openalex.org/W1498834178","https://openalex.org/W1504211573","https://openalex.org/W1511842436","https://openalex.org/W1540875416","https://openalex.org/W1541703086","https://openalex.org/W1545249138","https://openalex.org/W1546441687","https://openalex.org/W1552032016","https://openalex.org/W1556727271","https://openalex.org/W1563341929","https://openalex.org/W1567501709","https://openalex.org/W1575149347","https://openalex.org/W1578627459","https://openalex.org/W1597699498","https://openalex.org/W1598307445","https://openalex.org/W1598870173","https://openalex.org/W1605116544","https://openalex.org/W1607844659","https://openalex.org/W1635201779","https://openalex.org/W1763079358","https://openalex.org/W1800073441","https://openalex.org/W1822166485","https://openalex.org/W1865777748","https://openalex.org/W1889322616","https://openalex.org/W1904723009","https://openalex.org/W1937380053","https://openalex.org/W1965570021","https://openalex.org/W2003194200","https://openalex.org/W2027325533","https://openalex.org/W2027701442","https://openalex.org/W2041403073","https://openalex.org/W2072296411","https://openalex.org/W2082937818","https://openalex.org/W2087928947","https://openalex.org/W2103641030","https://openalex.org/W2109116994","https://openalex.org/W2109265351","https://openalex.org/W2132034299","https://openalex.org/W2132271754","https://openalex.org/W2136751047","https://openalex.org/W2137326899","https://openalex.org/W2145038746","https://openalex.org/W2156540767","https://openalex.org/W2166473670","https://openalex.org/W2186286189","https://openalex.org/W2234576048","https://openalex.org/W2293947265","https://openalex.org/W2395664524","https://openalex.org/W2400958143","https://openalex.org/W2408040052","https://openalex.org/W2481495684","https://openalex.org/W2495518322","https://openalex.org/W2554376114","https://openalex.org/W2577849411","https://openalex.org/W2741840250","https://openalex.org/W2795355075","https://openalex.org/W2883185786","https://openalex.org/W2912272895","https://openalex.org/W2913879733","https://openalex.org/W2932021267","https://openalex.org/W2941076300","https://openalex.org/W3000932475","https://openalex.org/W3021470151","https://openalex.org/W3048654417","https://openalex.org/W3089944233","https://openalex.org/W3110785930","https://openalex.org/W3147092115","https://openalex.org/W3184593118","https://openalex.org/W3200082646","https://openalex.org/W4244613003","https://openalex.org/W4287659893","https://openalex.org/W4295067147","https://openalex.org/W4317928179","https://openalex.org/W4324139589","https://openalex.org/W4366310679","https://openalex.org/W4386844082","https://openalex.org/W4401651413","https://openalex.org/W4402272058","https://openalex.org/W4408365991"],"related_works":[],"abstract_inverted_index":{"We":[0,107],"present":[1],"MSX,":[2],"a":[3,21,53,109,122,125,131,135,150],"new":[4],"family":[5],"of":[6,77,82,103,127],"64/128-bit":[7],"block":[8],"ciphers.":[9],"It":[10,96],"aims":[11,156],"to":[12,57,133],"provide":[13,108],"fast":[14],"execution":[15],"on":[16,25,39,113,124,138,146],"microcontrollers":[17,129],"and":[18,42,68,117,120,162],"comes":[19],"with":[20,52,130],"highly":[22],"reliable":[23],"argument":[24],"the":[26,34,167],"resistance":[27],"against":[28],"basic":[29],"differential/linear":[30,36,92],"attacks,":[31],"backed":[32],"by":[33,94],"classical":[35,48],"probability":[37],"analysis":[38,112],"Feistel":[40,50],"ciphers":[41,51],"Vaudenay's":[43,104],"decorrelation":[44,105],"theory.":[45,106],"MSX":[46,78,155],"are":[47],"(generalized)":[49],"round":[54,63],"function.":[55],"Similar":[56],"many":[58],"existing":[59],"ARX":[60],"ciphers,":[61],"its":[62,80],"function":[64],"uses":[65],"arithmetic":[66],"operations":[67],"does":[69],"not":[70,166],"have":[71],"an":[72,89,101],"S-box.":[73],"A":[74],"unique":[75],"feature":[76],"is":[79,165],"use":[81],"32-bit":[83,147],"integer":[84],"multiplication,":[85],"which":[86],"enables":[87],"proving":[88],"ideally":[90],"strong":[91],"property":[93],"design.":[95],"could":[97],"be":[98],"interpreted":[99],"as":[100],"application":[102],"detailed":[110],"security":[111,153,158,164],"attacks":[114],"beyond":[115],"differential":[116],"linear":[118],"ones":[119],"conduct":[121],"benchmark":[123],"range":[126],"popular":[128],"comparison":[132],"Speck,":[134],"top":[136],"performer":[137],"microcontrollers.":[139],"The":[140],"results":[141],"show":[142],"MSX's":[143],"good":[144],"performance":[145],"microcontrollers,":[148],"maintaining":[149],"sufficiently":[151],"large":[152],"margin.":[154],"at":[157],"under":[159],"single":[160],"key,":[161],"related-key":[163],"focus.":[168]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2026-01-09T00:00:00"}
