{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:59:34Z","timestamp":1740142774326,"version":"3.37.3"},"reference-count":26,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T00:00:00Z","timestamp":1671667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172410","61802400","62202460","61802399"],"award-info":[{"award-number":["62172410","61802400","62202460","61802399"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2701900","2018YFA0704704"],"award-info":[{"award-number":["2022YFB2701900","2018YFA0704704"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>BORON is a lightweight substitution\u2013permutation network cipher proposed in 2017. We reduce the number of guessed key bits by key-bridging technology and first utilize Fast Walsh Transform on BORON to minimize the time complexity. Finally, this paper gives the better key-recovery attack against block cipher BORON than previously proposed by 2 rounds: we realize a 11-round key-recovery attack on BORON-80 and 13-round key-recovery attack on BORON-128. The attacks proposed in this paper are the best attacks against BORON-80\/128 to date.<\/jats:p>","DOI":"10.1093\/comjnl\/bxac169","type":"journal-article","created":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T11:53:42Z","timestamp":1671796422000},"page":"210-219","source":"Crossref","is-referenced-by-count":0,"title":["Improved Linear Cryptanalysis of Block Cipher BORON"],"prefix":"10.1093","volume":"67","author":[{"given":"Yin","family":"Lv","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences , Beijing 100093 , China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing 100093 , China"}]},{"given":"Danping","family":"Shi","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences , Beijing 100093 , China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing 100093 , China"}]},{"given":"Lei","family":"Hu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences , Beijing 100093 , China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing 100093 , China"}]},{"given":"Zihui","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing 100093 , China"},{"name":"Institute of Information Engineering, Chinese Academy of Sciences , Beijing 100093 , China"}]},{"given":"Yi","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences , Beijing 100093 , China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing 100093 , China"}]},{"given":"Caibing","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences , Beijing 100093 , China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences , Beijing 100093 , China"}]}],"member":"286","published-online":{"date-parts":[[2022,12,22]]},"reference":[{"key":"2024012011490057300_ref1","first-page":"386","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"Matsui","year":"1993"},{"key":"2024012011490057300_ref2","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/BFb0053460","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"Nyberg","year":"1995"},{"key":"2024012011490057300_ref3","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s10623-012-9679-1","article-title":"Generalization of Matsui\u2019s Algorithm 1 to linear hull for key-alternating block ciphers","volume":"66","author":"Rock","year":"2013","journal-title":"Designs Codes Cryptography"},{"key":"2024012011490057300_ref4","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/978-3-030-92062-3_10","volume-title":"Advances in Cryptology - ASIACRYPT \u201821","author":"Leurent","year":"2021"},{"key":"2024012011490057300_ref5","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201804","author":"Biryukov","year":"2004"},{"key":"2024012011490057300_ref6","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-540-70500-0_15","volume-title":"Information Security and Privacy, 13th Australasian Conference","author":"Hermelin","year":"2008"},{"key":"2024012011490057300_ref7","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-3-642-03317-9_13","volume-title":"Fast Software Encryption (FSE)","author":"Hermelin","year":"2009"},{"key":"2024012011490057300_ref8","first-page":"57","volume-title":"Information Security and Cryptology","author":"Mouha","year":"2011"},{"key":"2024012011490057300_ref10","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/978-3-319-12087-4_3","volume-title":"Conference on Information Security and Cryptology (Inscrypt)","author":"Sun","year":"2014"},{"year":"2014","author":"Sun","key":"2024012011490057300_ref11"},{"key":"2024012011490057300_ref12","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201894","author":"Matsui","year":"1994"},{"key":"2024012011490057300_ref13","first-page":"77","volume-title":"Information Security and Cryptology (ICISC)","author":"Collard","year":"2007"},{"key":"2024012011490057300_ref14","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-030-45721-1_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201820","author":"Fl\u00f3rez-Guti\u00e9rrez","year":"2020"},{"key":"2024012011490057300_ref15","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-642-17373-8_10","volume-title":"Advances in Cryptology - ASIACRYPT \u201810","author":"Dunkelman","year":"2010"},{"key":"2024012011490057300_ref16","first-page":"127","volume-title":"Fast Software Encryption (FSE)","author":"Li","year":"2014"},{"key":"2024012011490057300_ref17","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-3-662-52993-5_13","volume-title":"Fast Software Encryption (FSE)","author":"Lin","year":"2016"},{"key":"2024012011490057300_ref18","first-page":"1","volume-title":"Information Security and Privacy","author":"Wang","year":"2014"},{"key":"2024012011490057300_ref19","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-662-48116-5_1","volume-title":"Fast Software Encryption (FSE)","author":"Biryukov","year":"2015"},{"key":"2024012011490057300_ref20","first-page":"233","volume-title":"Information and Communications Security","author":"Chen","year":"2019"},{"key":"2024012011490057300_ref21","first-page":"450","volume-title":"Cryptographic hardware and embedded systems","author":"Bogdanov","year":"2007"},{"key":"2024012011490057300_ref22","first-page":"175:1","volume-title":"Proceedings of the 52nd Annual Design Automation Conference","author":"Beaulieu","year":"2015"},{"key":"2024012011490057300_ref23","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-662-53008-5_5","volume-title":"Advances in Cryptology - CRYPTO \u201816","author":"Beierle","year":"2016"},{"key":"2024012011490057300_ref24","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1631\/FITEE.1500415","article-title":"BORON: an ultra lightweight and low power encryption design for pervasive computing","volume":"18","author":"Bansod","year":"2017","journal-title":"Front. Inform. Technol. Electron. Eng."},{"key":"2024012011490057300_ref25","doi-asserted-by":"crossref","DOI":"10.1155\/2019\/7862738","article-title":"Cryptanalysis of the lightweight block cipher BORON","volume":"2019","author":"Liang","year":"2019","journal-title":"Secur. Commun. Netw."},{"key":"2024012011490057300_ref26","doi-asserted-by":"crossref","first-page":"269","DOI":"10.46586\/tosc.v2021.i1.269-315","article-title":"Accelerating the search of differential and linear characteristics with the SAT method","volume":"2021","author":"Sun","year":"2021","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"2024012011490057300_ref27","first-page":"103","article-title":"New differential cryptanalysis results for the lightweight block cipher BORON","volume":"66","author":"Je","year":"2022","journal-title":"J. Inf. Secur. Appl."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/67\/1\/210\/56167779\/bxac169.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/67\/1\/210\/56167779\/bxac169.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,20]],"date-time":"2024-01-20T11:50:03Z","timestamp":1705751403000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/67\/1\/210\/6955889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,22]]},"references-count":26,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,12,22]]},"published-print":{"date-parts":[[2024,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxac169","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2024,1]]},"published":{"date-parts":[[2022,12,22]]}}}