{"id":"https://openalex.org/W2737222504","doi":"https://doi.org/10.3837/tiis.2017.01.028","title":"Security Analysis of the Whirlpool Hash Function in the Cloud of Things","display_name":"Security Analysis of the Whirlpool Hash Function in the Cloud of Things","publication_year":2016,"publication_date":"2016-01-31","ids":{"openalex":"https://openalex.org/W2737222504","doi":"https://doi.org/10.3837/tiis.2017.01.028","mag":"2737222504"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3837/tiis.2017.01.028","pdf_url":"http://www.itiis.org/digital-library/manuscript/file/21344/TIISVol11No1-29.pdf","source":{"id":"https://openalex.org/S204131793","display_name":"KSII Transactions on Internet and Information Systems","issn_l":"1976-7277","issn":["1976-7277","2288-1468"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323966148","host_organization_name":"Korea Society of Internet Information","host_organization_lineage":["https://openalex.org/P4323966148"],"host_organization_lineage_names":["Korea Society of Internet Information"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"http://www.itiis.org/digital-library/manuscript/file/21344/TIISVol11No1-29.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101930813","display_name":"Wei Li","orcid":"https://orcid.org/0000-0002-5481-008X"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Li","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University Shanghai, 201620, China","Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai, 200240, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Beijing, 100093, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University Shanghai, 201620, China","institution_ids":["https://openalex.org/I181326427"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Beijing, 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai, 200240, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101926731","display_name":"Zhiyong Gao","orcid":"https://orcid.org/0000-0003-4204-6536"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyong Gao","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University Shanghai, 201620, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University Shanghai, 201620, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008204306","display_name":"Dawu Gu","orcid":"https://orcid.org/0000-0002-0504-9538"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawu Gu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University Shanghai, 200240, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022305548","display_name":"Chenyu Ge","orcid":"https://orcid.org/0000-0001-9082-2953"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenyu Ge","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University Shanghai, 201620, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University Shanghai, 201620, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067170129","display_name":"Linfeng Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linfeng Liao","raw_affiliation_strings":["School of Computer Science and Technology, Donghua University Shanghai, 201620, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Donghua University Shanghai, 201620, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101506973","display_name":"Zhihong Zhou","orcid":"https://orcid.org/0009-0000-5897-931X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhihong Zhou","raw_affiliation_strings":["College of Information Security, Shanghai Jiao Tong University Shanghai, 200240, China","Department of Computer Science and Engineering, Shanghai Jiao Tong University Shanghai, 200240, China","Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai, 200240, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai, 200240, China","institution_ids":[]},{"raw_affiliation_string":"College of Information Security, Shanghai Jiao Tong University Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108577278","display_name":"Ya Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I148128674","display_name":"University of Shanghai for Science and Technology","ror":"https://ror.org/00ay9v204","country_code":"CN","type":"education","lineage":["https://openalex.org/I148128674"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ya Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University Shanghai, 200240, China","Department of Computer Science and Engineering, University of Shanghai for Science and Technology Shanghai, 200093, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Shanghai for Science and Technology Shanghai, 200093, China","institution_ids":["https://openalex.org/I148128674"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100415123","display_name":"Zhiqiang Liu","orcid":"https://orcid.org/0000-0003-2982-8381"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhiqiang Liu","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101506973"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.481,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":5,"citation_normalized_percentile":{"value":0.681112,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9963,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.992,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.4798731}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8765137},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7123495},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5146752},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48298445},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4798731},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.43468815},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.42980492},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24454707},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.3837/tiis.2017.01.028","pdf_url":"http://www.itiis.org/digital-library/manuscript/file/21344/TIISVol11No1-29.pdf","source":{"id":"https://openalex.org/S204131793","display_name":"KSII Transactions on Internet and Information Systems","issn_l":"1976-7277","issn":["1976-7277","2288-1468"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323966148","host_organization_name":"Korea Society of Internet Information","host_organization_lineage":["https://openalex.org/P4323966148"],"host_organization_lineage_names":["Korea Society of Internet Information"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3837/tiis.2017.01.028","pdf_url":"http://www.itiis.org/digital-library/manuscript/file/21344/TIISVol11No1-29.pdf","source":{"id":"https://openalex.org/S204131793","display_name":"KSII Transactions on Internet and Information Systems","issn_l":"1976-7277","issn":["1976-7277","2288-1468"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323966148","host_organization_name":"Korea Society of Internet Information","host_organization_lineage":["https://openalex.org/P4323966148"],"host_organization_lineage_names":["Korea Society of Internet Information"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":29,"referenced_works":["https://openalex.org/W132178448","https://openalex.org/W1484814447","https://openalex.org/W1552695992","https://openalex.org/W1603433154","https://openalex.org/W1779923173","https://openalex.org/W1829732909","https://openalex.org/W1969690570","https://openalex.org/W1997034776","https://openalex.org/W2005418451","https://openalex.org/W2016155892","https://openalex.org/W2030362350","https://openalex.org/W2066425771","https://openalex.org/W2110162979","https://openalex.org/W2110941647","https://openalex.org/W2112284176","https://openalex.org/W2114091669","https://openalex.org/W2119153286","https://openalex.org/W2131300413","https://openalex.org/W2136320902","https://openalex.org/W2151514199","https://openalex.org/W2170489924","https://openalex.org/W2272764376","https://openalex.org/W2296028531","https://openalex.org/W25119858","https://openalex.org/W41296744","https://openalex.org/W4230218059","https://openalex.org/W73035980","https://openalex.org/W806182678","https://openalex.org/W94002110"],"related_works":["https://openalex.org/W2949619078","https://openalex.org/W2613610283","https://openalex.org/W2242320573","https://openalex.org/W2221520808","https://openalex.org/W2157568185","https://openalex.org/W2106698019","https://openalex.org/W1987209102","https://openalex.org/W1890487585","https://openalex.org/W1674074891","https://openalex.org/W1487949331"],"abstract_inverted_index":{"With":[0],"the":[1,32,66,87,94,101,118,139,147],"advancement":[2],"and":[3,11,54,76,100,125,146],"deployment":[4],"of":[5,17,35,65,86,144],"leading-edge":[6],"telecommunication":[7],"technologies":[8],"for":[9,70,97],"sensing":[10],"collecting,":[12],"computing":[13],"related":[14],"information,":[15],"Cloud":[16],"Things":[18],"(CoTs)":[19],"has":[20,82],"emerged":[21],"as":[22,39,63,84],"a":[23],"typical":[24],"application":[25],"platform":[26],"that":[27,129],"is":[28,60,151],"envisioned":[29],"to":[30,72,137],"revolutionize":[31],"daily":[33],"activities":[34],"human":[36],"society,":[37],"such":[38],"intelligent":[40],"transportation,":[41],"modern":[42],"logistics,":[43],"food":[44],"safety,":[45],"environmental":[46],"monitoring,":[47],"etc.To":[48],"avoid":[49],"any":[50],"possible":[51],"malicious":[52],"attack":[53],"resource":[55],"abuse,":[56],"employing":[57],"hash":[58,80],"functions":[59],"widely":[61],"recognized":[62],"one":[64],"most":[67],"effective":[68,111],"approaches":[69],"CoTs":[71],"achieve":[73],"message":[74,142],"integrity":[75],"data":[77],"authentication.The":[78],"Whirlpool":[79,116],"function":[81],"served":[83],"part":[85],"joint":[88],"ISO/IEC":[89],"10118-3":[90],"International":[91,95,102],"Standard":[92],"by":[93],"Organization":[96],"Standardization":[98],"(ISO)":[99],"Electrotechnical":[103],"Commission":[104],"(IEC).In":[105],"this":[106],"paper,":[107],"we":[108],"propose":[109],"an":[110],"differential":[112],"fault":[113,121],"analysis":[114,124],"on":[115,133],"in":[117],"byte-oriented":[119],"random":[120,131],"model.The":[122],"mathematical":[123],"experimental":[126],"results":[127],"show":[128],"8":[130],"faults":[132],"average":[134],"are":[135],"required":[136],"obtain":[138],"current":[140],"512-bit":[141],"input":[143],"whirlpool":[145],"secret":[148],"This":[149],"work":[150]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2737222504","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-01-20T14:04:05.841835","created_date":"2017-07-31"}