{"id":"https://openalex.org/W2920398196","doi":"https://doi.org/10.1109/access.2019.2900765","title":"Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions","display_name":"Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2920398196","doi":"https://doi.org/10.1109/access.2019.2900765","mag":"2920398196"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2900765","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08653865.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08653865.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083751433","display_name":"Shibin Zhao","orcid":"https://orcid.org/0000-0002-7598-5495"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shibin Zhao","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065169722","display_name":"Xiaohan Duan","orcid":null},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohan Duan","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015948044","display_name":"Yuanhao Deng","orcid":null},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanhao Deng","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025990839","display_name":"Zhiniang Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210092299","display_name":"Qihoo 360 (China)","ror":"https://ror.org/00p4rkj69","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210092299"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiniang Peng","raw_affiliation_strings":["Qihoo 360 Core Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Qihoo 360 Core Security, Beijing, China","institution_ids":["https://openalex.org/I4210092299"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015855630","display_name":"Junhu Zhu","orcid":"https://orcid.org/0000-0002-6914-2424"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhu Zhu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.563,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":7,"citation_normalized_percentile":{"value":0.836955,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":82,"max":83},"biblio":{"volume":"7","issue":null,"first_page":"34416","last_page":"34424"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.99,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9869,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6787852},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.50655854},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43473828},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.40878257},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3558335},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.3462056},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27932715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12028977}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2900765","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08653865.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/8301be217ca24c16b3a72d4855c6420f","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2900765","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08653865.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.46,"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61502528"}],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W131718440","https://openalex.org/W1408712796","https://openalex.org/W1513013279","https://openalex.org/W1540366790","https://openalex.org/W2074886859","https://openalex.org/W207657696","https://openalex.org/W2082937818","https://openalex.org/W2164015945","https://openalex.org/W2185035398","https://openalex.org/W2287397056","https://openalex.org/W2496427131","https://openalex.org/W380217570","https://openalex.org/W4252824418"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2980963558","https://openalex.org/W2187401768","https://openalex.org/W2181743346","https://openalex.org/W2181413294","https://openalex.org/W2140798747","https://openalex.org/W2073681303","https://openalex.org/W2053286651","https://openalex.org/W2052122378","https://openalex.org/W2051487156"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,99],"present":[4],"improved":[5],"meet-in-the-middle":[6,41],"key-recovery":[7,75,182],"attacks":[8,17],"on":[9,20,78,184],"six-round":[10,36],"and":[11,152],"seven-round":[12,80,186],"Feistel":[13,37,81,187],"constructions":[14],"separately.":[15],"The":[16,43,140],"are":[18],"based":[19],"Guo":[21],"et":[22],"al.'s":[23],"work":[24],"which":[25,56,110],"appends":[26],"one":[27,87],"round":[28,89],"to":[29,33,67,122,145,158],"the":[30,35,40,53,58,79,105,112,131,137,153,171,178,185,197],"five-round":[31,92],"distinguisher":[32],"attack":[34,76,132,183,192],"construction":[38,82,188],"through":[39],"method.":[42],"proposed":[44,84],"method":[45,77,103],"stores":[46],"only":[47],"target":[48],"sequences":[49],"instead":[50],"of":[51,164,173],"all":[52],"possible":[54],"sequences,":[55],"reduces":[57,111],"memory":[59,154],"complexity":[60,114,133,142,155,193],"from":[61,115],"2":[62,68,116,159,165],"(3/4)n":[65,162],"blocks":[66,163],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(n/2)":[71,168],"blocks.":[72],"A":[73],"new":[74,102],"is":[83,95,97,134,143,156,177],"by":[85],"appending":[86],"another":[88],"after":[90],"a":[91,101,190],"distinguisher.":[93],"What":[94],"more,":[96],"that":[98,130],"propose":[100],"called":[104],"impossible-differential":[106],"pairs":[107],"sieve":[108],"technique":[109],"data":[113],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n":[119],"chosen":[120,127],"plaintexts":[121,128],"3\u00d72":[123,147],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n-2":[126,150],"so":[129],"lower":[135,191],"than":[136],"exhaustive":[138,198],"attack.":[139,199],"time":[141],"equivalent":[144],"about":[146],"encryptions,":[151],"optimized":[157],"bits.":[169],"To":[170],"best":[172],"our":[174],"knowledge,":[175],"it":[176],"first":[179],"known":[180],"generic":[181],"with":[189,196],"when":[194],"compared":[195]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2920398196","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-04-15T20:25:12.248883","created_date":"2019-03-11"}