{"id":"https://openalex.org/W1715931484","doi":"https://doi.org/10.3837/tiis.2015.02.018","title":"Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things","display_name":"Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things","publication_year":2015,"publication_date":"2015-02-28","ids":{"openalex":"https://openalex.org/W1715931484","doi":"https://doi.org/10.3837/tiis.2015.02.018","mag":"1715931484"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3837/tiis.2015.02.018","pdf_url":"https://itiis.org/digital-library/manuscript/file/20738/TIISVol9No2-18.pdf","source":{"id":"https://openalex.org/S204131793","display_name":"KSII Transactions on Internet and Information Systems","issn_l":"1976-7277","issn":["1976-7277","2288-1468"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4323966148","host_organization_name":"Korea Society of Internet Information","host_organization_lineage":["https://openalex.org/P4323966148"],"host_organization_lineage_names":["Korea Society of Internet Information"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://itiis.org/digital-library/manuscript/file/20738/TIISVol9No2-18.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101997634","display_name":"Wei Li","orcid":"https://orcid.org/0000-0003-0887-3116"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Li","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100401848","display_name":"Wenwen Zhang","orcid":"https://orcid.org/0000-0001-7456-8588"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenwen Zhang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008204306","display_name":"Dawu Gu","orcid":"https://orcid.org/0000-0002-0504-9538"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dawu Gu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109214478","display_name":"Zhi Tao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhi Tao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101506973","display_name":"Zhihong Zhou","orcid":"https://orcid.org/0009-0000-5897-931X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhihong Zhou","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108577278","display_name":"Ya Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ya Liu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5029132763","display_name":"Zhi\u2010Qiang Liu","orcid":"https://orcid.org/0000-0003-3259-6796"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhiqiang Liu","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.589,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":7,"citation_normalized_percentile":{"value":0.759517,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"9","issue":"2","first_page":"793","last_page":"810"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9954,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.41096035}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.899052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.61365694},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.59307057},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.4403024},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.41096035},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.41064942},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2669862}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.3837/tiis.2015.02.018","pdf_url":"https://itiis.org/digital-library/manuscript/file/20738/TIISVol9No2-18.pdf","source":{"id":"https://openalex.org/S204131793","display_name":"KSII Transactions on Internet and Information Systems","issn_l":"1976-7277","issn":["1976-7277","2288-1468"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4323966148","host_organization_name":"Korea Society of Internet Information","host_organization_lineage":["https://openalex.org/P4323966148"],"host_organization_lineage_names":["Korea Society of Internet Information"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3837/tiis.2015.02.018","pdf_url":"https://itiis.org/digital-library/manuscript/file/20738/TIISVol9No2-18.pdf","source":{"id":"https://openalex.org/S204131793","display_name":"KSII Transactions on Internet and Information Systems","issn_l":"1976-7277","issn":["1976-7277","2288-1468"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4323966148","host_organization_name":"Korea Society of Internet Information","host_organization_lineage":["https://openalex.org/P4323966148"],"host_organization_lineage_names":["Korea Society of Internet Information"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":29,"referenced_works":["https://openalex.org/W129018817","https://openalex.org/W1484814447","https://openalex.org/W1494122421","https://openalex.org/W1537875328","https://openalex.org/W1566796882","https://openalex.org/W1599252161","https://openalex.org/W1613874182","https://openalex.org/W165044576","https://openalex.org/W1779923173","https://openalex.org/W182571705","https://openalex.org/W1829732909","https://openalex.org/W1890449996","https://openalex.org/W2001537715","https://openalex.org/W2005418451","https://openalex.org/W2007151319","https://openalex.org/W2024394927","https://openalex.org/W2066425771","https://openalex.org/W2088898213","https://openalex.org/W2096118443","https://openalex.org/W2104317001","https://openalex.org/W2110162979","https://openalex.org/W2110941647","https://openalex.org/W2113394987","https://openalex.org/W2154667225","https://openalex.org/W2154909745","https://openalex.org/W2170489924","https://openalex.org/W2271434025","https://openalex.org/W2344782235","https://openalex.org/W2572579712"],"related_works":["https://openalex.org/W4377970597","https://openalex.org/W4318486113","https://openalex.org/W3111735654","https://openalex.org/W2946173424","https://openalex.org/W2771100544","https://openalex.org/W2765258300","https://openalex.org/W2558883312","https://openalex.org/W2357964614","https://openalex.org/W1583282117","https://openalex.org/W1518563014"],"abstract_inverted_index":{"The":[0],"TWINE":[1,92,129],"is":[2,130],"a":[3],"new":[4],"Generalized":[5],"Feistel":[6],"Structure":[7],"(GFS)":[8],"lightweight":[9,70,149],"cryptosystem":[10],"in":[11,123,151],"the":[12,20,36,45,56,67,72,75,80,91,100,128,140,143,152],"Internet":[13,153],"of":[14,69,74,142,146,154],"Things.It":[15],"has":[16,60],"36":[17],"rounds":[18],"and":[19,26,40,53,79,95,106,115],"key":[21],"lengths":[22],"support":[23],"80":[24],"bits":[25],"128":[27],"bits,":[28],"which":[29],"are":[30],"flexible":[31],"to":[32,44,65,132,139],"provide":[33],"security":[34,68],"for":[35],"RFID,":[37],"smart":[38],"cards":[39],"other":[41,54,147],"highly-constrained":[42],"devices.Due":[43],"strong":[46],"attacking":[47],"ability,":[48],"fast":[49],"speed,":[50],"simple":[51],"implementation":[52],"characteristics,":[55],"differential":[57,81,87,133],"fault":[58,77,88,134],"analysis":[59,94,141],"become":[61],"an":[62,85],"important":[63],"method":[64],"evaluate":[66],"cryptosystems.On":[71],"basis":[73],"4-bit":[76],"model":[78],"analysis,":[82],"we":[83],"propose":[84],"effective":[86],"attack":[89,101],"on":[90,119],"cryptosystem.Mathematical":[93],"simulating":[96],"experiments":[97],"show":[98],"that":[99,127],"could":[102],"recover":[103],"its":[104],"80-bit":[105],"128-bit":[107],"secret":[108],"keys":[109],"by":[110],"introducing":[111],"8":[112],"faulty":[113,117],"ciphertexts":[114,118],"18":[116],"average,":[120],"respectively.The":[121],"result":[122],"this":[124],"study":[125],"describes":[126],"vulnerable":[131],"analysis.It":[135],"will":[136],"be":[137],"beneficial":[138],"same":[144],"type":[145],"iterated":[148],"cryptosystems":[150],"Things.":[155]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1715931484","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-03-22T08:24:35.353316","created_date":"2016-06-24"}