{"id":"https://openalex.org/W2727803417","doi":"https://doi.org/10.1049/iet-ifs.2017.0232","title":"Internal state recovery of Grain v1 employing guess\u2010and\u2010determine attack","display_name":"Internal state recovery of Grain v1 employing guess\u2010and\u2010determine attack","publication_year":2017,"publication_date":"2017-06-30","ids":{"openalex":"https://openalex.org/W2727803417","doi":"https://doi.org/10.1049/iet-ifs.2017.0232","mag":"2727803417"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-ifs.2017.0232","pdf_url":null,"source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084574395","display_name":"Zhen Ma","orcid":"https://orcid.org/0000-0002-4883-0981"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Ma","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, 62 Kexue Road, Zhengzhou, People's Republic of China","State Key Laboratory of Cryptology, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, 62 Kexue Road, Zhengzhou, People's Republic of China","institution_ids":[]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100419125","display_name":"Tian Tian","orcid":null},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Tian","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, 62 Kexue Road, Zhengzhou, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, 62 Kexue Road, Zhengzhou, People's Republic of China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101738495","display_name":"Wen\u2010Feng Qi","orcid":"https://orcid.org/0000-0002-3031-4719"},"institutions":[],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wen\u2010Feng Qi","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, 62 Kexue Road, Zhengzhou, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, 62 Kexue Road, Zhengzhou, People's Republic of China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101738495"],"corresponding_institution_ids":[],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":null,"fwci":0.189,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.598054,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":77},"biblio":{"volume":"11","issue":"6","first_page":"363","last_page":"368"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9936,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.821527},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.69379294},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.6361922},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.63041455},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.5054271},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.47619048},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4583191},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.42826027},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.384474},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19292885},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.08255258},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-ifs.2017.0232","pdf_url":null,"source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W1544956979","https://openalex.org/W1554090281","https://openalex.org/W1572847050","https://openalex.org/W1903742260","https://openalex.org/W2006824395","https://openalex.org/W2012646342","https://openalex.org/W2020364349","https://openalex.org/W2076397729","https://openalex.org/W2126787366","https://openalex.org/W2130943734","https://openalex.org/W2298415206","https://openalex.org/W2405052123","https://openalex.org/W359206926","https://openalex.org/W6399285"],"related_works":["https://openalex.org/W4288849478","https://openalex.org/W3089223619","https://openalex.org/W2940752727","https://openalex.org/W2903451324","https://openalex.org/W2893407266","https://openalex.org/W2516549250","https://openalex.org/W24612159","https://openalex.org/W2381843700","https://openalex.org/W1604915031","https://openalex.org/W1561797008"],"abstract_inverted_index":{"The":[0,27,91],"well-known":[1],"stream":[2,165],"cipher":[3],"Grain":[4,23,81,101,148],"v1":[5,24,82,102,149],"is":[6,25,42,67,85,121,135],"one":[7],"of":[8,11,58,80,100,110,115,144,147],"the":[9,38,44,56,59,62,77,86,131,137,142,145,151],"finalists":[10],"European":[12],"eSTREAM":[13],"project.":[14],"In":[15],"this":[16,71,156],"study,":[17],"a":[18,31,108],"novel":[19],"guess-and-determine":[20,152],"attack":[21,28,92,153],"on":[22,50,55,162],"introduced.":[26],"primarily":[29],"employs":[30],"new":[32,158],"conditional":[33],"BSW":[34,63],"sampling":[35,64,78],"technique":[36,72],"and":[37,117,154],"main":[39],"creative":[40],"idea":[41],"that":[43,69,123],"conditions":[45],"are":[46,126],"set":[47],"not":[48],"only":[49,104],"state":[51,98],"bits":[52],"but":[53],"also":[54,136],"updates":[57,143],"registers":[60,146],"for":[61,160],"technique.":[65],"It":[66,120],"shown":[68,122],"using":[70],"we":[73],"can":[74],"further":[75],"reduce":[76],"resistance":[79],"to":[83,94,140],"which":[84],"best":[87],"result":[88],"so":[89],"far.":[90],"leads":[93],"an":[95],"efficient":[96],"internal":[97],"recovery":[99],"with":[103,130],"online":[105],"time":[106],"employing":[107],"memory":[109],",":[111],"requiring":[112],"keystreams":[113],"each":[114],"length":[116],"preprocessing":[118],"time.":[119],"these":[124],"figures":[125],"obviously":[127],"better":[128],"compared":[129],"previous":[132],"results.":[133],"This":[134],"first":[138],"attempt":[139],"control":[141],"in":[150],"hopefully":[155],"provides":[157],"insights":[159],"cryptanalysis":[161],"such":[163],"compact":[164],"ciphers.":[166]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2727803417","counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-02-20T17:59:24.284427","created_date":"2017-07-14"}