{"id":"https://openalex.org/W2810305578","doi":"https://doi.org/10.1109/tc.2018.2851239","title":"On Analysis of Lightweight Stream Ciphers with Keyed Update","display_name":"On Analysis of Lightweight Stream Ciphers with Keyed Update","publication_year":2018,"publication_date":"2018-06-29","ids":{"openalex":"https://openalex.org/W2810305578","doi":"https://doi.org/10.1109/tc.2018.2851239","mag":"2810305578"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2018.2851239","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083651729","display_name":"Orhun Kara","orcid":"https://orcid.org/0000-0002-9685-6625"},"institutions":[{"id":"https://openalex.org/I4210141511","display_name":"TUBITAK BILGEM","ror":"https://ror.org/057kvja37","country_code":"TR","type":"government","lineage":["https://openalex.org/I4210141511"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Orhun Kara","raw_affiliation_strings":["T\u00dcB\u0130TAK B\u0130LGEM UEKAE National Research Institute of Cryptology and Electronics, Gebze, Kocaeli, Turkey"],"affiliations":[{"raw_affiliation_string":"T\u00dcB\u0130TAK B\u0130LGEM UEKAE National Research Institute of Cryptology and Electronics, Gebze, Kocaeli, Turkey","institution_ids":["https://openalex.org/I4210141511"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036381633","display_name":"Muhammed F. Esgin","orcid":null},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Muhammed F. Esgin","raw_affiliation_strings":["Data61, CSIRO, Canberra, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.611,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":12,"citation_normalized_percentile":{"value":0.843827,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":"68","issue":"1","first_page":"99","last_page":"110"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.7574009},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6936529},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.6176856},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.57772756},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5105868},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.47009966},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41131663},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4043338},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.106848896}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2018.2851239","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.41}],"grants":[{"funder":"https://openalex.org/F4320320366","funder_display_name":"European Cooperation in Science and Technology","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W153516704","https://openalex.org/W1554090281","https://openalex.org/W1607874478","https://openalex.org/W1827311732","https://openalex.org/W1894646615","https://openalex.org/W2006824395","https://openalex.org/W2012646342","https://openalex.org/W2141124495","https://openalex.org/W2190847501","https://openalex.org/W2276318674","https://openalex.org/W2293947265","https://openalex.org/W2296473011","https://openalex.org/W2397074368","https://openalex.org/W2397402334","https://openalex.org/W2398101434","https://openalex.org/W2402108048","https://openalex.org/W2572117397","https://openalex.org/W2605279000","https://openalex.org/W3030624396","https://openalex.org/W4213193213","https://openalex.org/W4256468542"],"related_works":["https://openalex.org/W862755557","https://openalex.org/W2951785426","https://openalex.org/W2547991215","https://openalex.org/W22755609","https://openalex.org/W2162901123","https://openalex.org/W2085777029","https://openalex.org/W2004360898","https://openalex.org/W1995085127","https://openalex.org/W1934481693","https://openalex.org/W1518828598"],"abstract_inverted_index":{"As":[0],"the":[1,12,15,36,41,51,139,183,188,200,204,223,242],"need":[2],"for":[3,25,133,138,199],"lightweight":[4,30],"cryptography":[5],"has":[6,20],"grown":[7],"even":[8],"more":[9],"due":[10],"to":[11,27,54,169,221],"evolution":[13],"of":[14,17,38,108,145,203,225,235,241],"Internet":[16],"Things,":[18],"it":[19],"become":[21],"a":[22,70,99,113,129,143,229],"greater":[23],"challenge":[24],"cryptographers":[26],"design":[28],"ultra":[29],"stream":[31,82],"ciphers":[32],"in":[33,64,79,112,121,228],"compliance":[34],"with":[35,84,90,95,110,135,150,156,172],"rule":[37],"thumb":[39],"that":[40,187],"internal":[42,86],"state":[43],"size":[44,53],"should":[45],"be":[46],"at":[47],"least":[48],"twice":[49],"as":[50],"key":[52,190],"defend":[55],"against":[56],"generic":[57,165,237],"Time-Memory-Data":[58],"Tradeoff":[59],"(TMDT)":[60],"attacks.":[61],"However,":[62],"Recently":[63],"2015,":[65],"Armknecht":[66],"and":[67,97,137,179,213],"Mikhalev":[68],"sparked":[69],"new":[71],"light":[72],"on":[73,246],"designing":[74],"keystream":[75],"generators":[76],"(KSGs),":[77],"which":[78],"turn":[80],"yields":[81,239],"ciphers,":[83],"small":[85],"states,":[87],"called":[88,148],"KSG":[89,171],"Keyed":[91,152],"Update":[92],"Function":[93,154],"(KSG":[94,155],"KUF),":[96],"gave":[98],"concrete":[100],"construction":[101],"named":[102],"Sprout.":[103,247],"But,":[104],"currently,":[105],"security":[106],"analysis":[107],"KSGs":[109,134,149],"KUF":[111],"general":[114,130],"setting":[115,132],"is":[116,124,186,192],"almost":[117,176],"non-existent.":[118],"Our":[119,207],"contribution":[120],"this":[122],"paper":[123],"two-fold.":[125],"1)":[126],"We":[127,194,218],"give":[128],"mathematical":[131],"KUF,":[136],"first":[140,205],"time,":[141],"analyze":[142],"class":[144],"such":[146],"KSGs,":[147],"Boolean":[151,157,173],"Feedback":[153],"KFF),":[158],"generically.":[159],"In":[160],"particular,":[161],"we":[162],"develop":[163],"two":[164],"attack":[166],"algorithms":[167,212,227],"applicable":[168],"any":[170],"KFF":[174],"having":[175],"arbitrary":[177],"output":[178],"feedback":[180],"functions":[181],"where":[182],"only":[184],"requirement":[185],"secret":[189],"incorporation":[191],"biased.":[193],"introduce":[195],"an":[196],"upper":[197],"bound":[198],"time":[201],"complexity":[202],"algorithm.":[206],"extensive":[208],"experiments":[209],"validate":[210],"our":[211,226,236],"assumptions":[214],"made":[215],"thereof.":[216],"2)":[217],"study":[219],"Sprout":[220],"show":[222],"effectiveness":[224],"practical":[230],"instance.":[231],"A":[232],"straightforward":[233],"application":[234],"algorithm":[238],"one":[240],"most":[243],"successful":[244],"attacks":[245]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2810305578","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4}],"updated_date":"2024-12-10T22:40:41.901694","created_date":"2018-07-10"}