{"id":"https:\/\/openalex.org\/W4240039531","doi":"https:\/\/doi.org\/10.1007\/s00145-017-9260-1","title":"Practical Cryptanalysis of Bluetooth Encryption with Condition Masking","display_name":"Practical Cryptanalysis of Bluetooth Encryption with Condition Masking","publication_year":2017,"publication_date":"2017-07-10","ids":{"openalex":"https:\/\/openalex.org\/W4240039531","doi":"https:\/\/doi.org\/10.1007\/s00145-017-9260-1"},"language":"en","primary_location":{"id":"doi:10.1007\/s00145-017-9260-1","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1007\/s00145-017-9260-1","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https:\/\/openalex.org\/P4310319900","https:\/\/openalex.org\/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5100392879","display_name":"Bin Zhang","orcid":"https:\/\/orcid.org\/0000-0002-9038-7514"},"institutions":[{"id":"https:\/\/openalex.org\/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https:\/\/ror.org\/02pn5rj08","country_code":"CN","type":"government","lineage":["https:\/\/openalex.org\/I4210132990"]},{"id":"https:\/\/openalex.org\/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https:\/\/ror.org\/05qbk4x57","country_code":"CN","type":"education","lineage":["https:\/\/openalex.org\/I19820366","https:\/\/openalex.org\/I4210165038"]},{"id":"https:\/\/openalex.org\/I19820366","display_name":"Chinese Academy of Sciences","ror":"https:\/\/ror.org\/034t30j35","country_code":"CN","type":"funder","lineage":["https:\/\/openalex.org\/I19820366"]},{"id":"https:\/\/openalex.org\/I4210128818","display_name":"Institute of Software","ror":"https:\/\/ror.org\/033dfsn42","country_code":"CN","type":"facility","lineage":["https:\/\/openalex.org\/I19820366","https:\/\/openalex.org\/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bin Zhang","raw_affiliation_strings":["State Key Laboratory of Cryptology, P.O.Box 5159, Beijing, 100878, China","TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China","University of Chinese Academy of Sciences, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O.Box 5159, Beijing, 100878, China","institution_ids":["https:\/\/openalex.org\/I4210132990"]},{"raw_affiliation_string":"TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China","institution_ids":["https:\/\/openalex.org\/I4210128818","https:\/\/openalex.org\/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https:\/\/openalex.org\/I4210165038"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5022997052","display_name":"Chao Xu","orcid":"https:\/\/orcid.org\/0000-0002-0873-7192"},"institutions":[{"id":"https:\/\/openalex.org\/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https:\/\/ror.org\/02pn5rj08","country_code":"CN","type":"government","lineage":["https:\/\/openalex.org\/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Xu","raw_affiliation_strings":["State Key Laboratory of Cryptology, P.O.Box 5159, Beijing, 100878, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O.Box 5159, Beijing, 100878, China","institution_ids":["https:\/\/openalex.org\/I4210132990"]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5101790997","display_name":"Dengguo Feng","orcid":"https:\/\/orcid.org\/0000-0002-8515-7124"},"institutions":[{"id":"https:\/\/openalex.org\/I4210128818","display_name":"Institute of Software","ror":"https:\/\/ror.org\/033dfsn42","country_code":"CN","type":"facility","lineage":["https:\/\/openalex.org\/I19820366","https:\/\/openalex.org\/I4210128818"]},{"id":"https:\/\/openalex.org\/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https:\/\/ror.org\/02pn5rj08","country_code":"CN","type":"government","lineage":["https:\/\/openalex.org\/I4210132990"]},{"id":"https:\/\/openalex.org\/I19820366","display_name":"Chinese Academy of Sciences","ror":"https:\/\/ror.org\/034t30j35","country_code":"CN","type":"funder","lineage":["https:\/\/openalex.org\/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dengguo Feng","raw_affiliation_strings":["State Key Laboratory of Cryptology, P.O.Box 5159, Beijing, 100878, China","TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O.Box 5159, Beijing, 100878, China","institution_ids":["https:\/\/openalex.org\/I4210132990"]},{"raw_affiliation_string":"TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China","institution_ids":["https:\/\/openalex.org\/I4210128818","https:\/\/openalex.org\/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https:\/\/openalex.org\/A5100392879"],"corresponding_institution_ids":["https:\/\/openalex.org\/I19820366","https:\/\/openalex.org\/I4210128818","https:\/\/openalex.org\/I4210132990","https:\/\/openalex.org\/I4210165038"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.6224,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79199014,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"31","issue":"2","first_page":"394","last_page":"433"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11130","display_name":"Coding theory and cryptography","score":0.9994999766349792,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9876000285148621,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.7314682602882385},{"id":"https:\/\/openalex.org\/keywords\/encryption","display_name":"Encryption","score":0.6372699737548828},{"id":"https:\/\/openalex.org\/keywords\/ciphertext","display_name":"Ciphertext","score":0.6280427575111389},{"id":"https:\/\/openalex.org\/keywords\/cryptanalysis","display_name":"Cryptanalysis","score":0.5480412244796753},{"id":"https:\/\/openalex.org\/keywords\/masking","display_name":"Masking (illustration)","score":0.48075148463249207},{"id":"https:\/\/openalex.org\/keywords\/brute-force-attack","display_name":"Brute-force attack","score":0.4624519646167755},{"id":"https:\/\/openalex.org\/keywords\/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.45181044936180115},{"id":"https:\/\/openalex.org\/keywords\/theoretical-computer-science","display_name":"Theoretical computer science","score":0.444539338350296},{"id":"https:\/\/openalex.org\/keywords\/decoding-methods","display_name":"Decoding methods","score":0.4276999235153198},{"id":"https:\/\/openalex.org\/keywords\/computation","display_name":"Computation","score":0.4205419719219208},{"id":"https:\/\/openalex.org\/keywords\/multiple-encryption","display_name":"Multiple encryption","score":0.4189279079437256},{"id":"https:\/\/openalex.org\/keywords\/key","display_name":"Key (lock)","score":0.4184882640838623},{"id":"https:\/\/openalex.org\/keywords\/correlation-attack","display_name":"Correlation attack","score":0.4115831255912781},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.3973705470561981},{"id":"https:\/\/openalex.org\/keywords\/algorithm","display_name":"Algorithm","score":0.3684520721435547},{"id":"https:\/\/openalex.org\/keywords\/computer-engineering","display_name":"Computer engineering","score":0.34626835584640503},{"id":"https:\/\/openalex.org\/keywords\/public-key-cryptography","display_name":"Public-key cryptography","score":0.16481474041938782}],"concepts":[{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.7314682602882385},{"id":"https:\/\/openalex.org\/C148730421","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q141090","display_name":"Encryption","level":2,"score":0.6372699737548828},{"id":"https:\/\/openalex.org\/C93974786","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1589480","display_name":"Ciphertext","level":3,"score":0.6280427575111389},{"id":"https:\/\/openalex.org\/C181149355","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5480412244796753},{"id":"https:\/\/openalex.org\/C2777402240","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.48075148463249207},{"id":"https:\/\/openalex.org\/C207468940","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q869370","display_name":"Brute-force attack","level":3,"score":0.4624519646167755},{"id":"https:\/\/openalex.org\/C7646194","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.45181044936180115},{"id":"https:\/\/openalex.org\/C80444323","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.444539338350296},{"id":"https:\/\/openalex.org\/C57273362","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q576722","display_name":"Decoding methods","level":2,"score":0.4276999235153198},{"id":"https:\/\/openalex.org\/C45374587","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q12525525","display_name":"Computation","level":2,"score":0.4205419719219208},{"id":"https:\/\/openalex.org\/C184685986","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4189279079437256},{"id":"https:\/\/openalex.org\/C26517878","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q228039","display_name":"Key (lock)","level":2,"score":0.4184882640838623},{"id":"https:\/\/openalex.org\/C120226833","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5172844","display_name":"Correlation attack","level":4,"score":0.4115831255912781},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.3973705470561981},{"id":"https:\/\/openalex.org\/C11413529","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8366","display_name":"Algorithm","level":1,"score":0.3684520721435547},{"id":"https:\/\/openalex.org\/C113775141","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q428691","display_name":"Computer engineering","level":1,"score":0.34626835584640503},{"id":"https:\/\/openalex.org\/C203062551","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16481474041938782},{"id":"https:\/\/openalex.org\/C142362112","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q735","display_name":"Art","level":0,"score":0},{"id":"https:\/\/openalex.org\/C153349607","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q36649","display_name":"Visual arts","level":1,"score":0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007\/s00145-017-9260-1","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1007\/s00145-017-9260-1","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https:\/\/openalex.org\/P4310319900","https:\/\/openalex.org\/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https:\/\/openalex.org\/W1699105","https:\/\/openalex.org\/W175301073","https:\/\/openalex.org\/W767704278","https:\/\/openalex.org\/W1490223983","https:\/\/openalex.org\/W1519988299","https:\/\/openalex.org\/W1530341164","https:\/\/openalex.org\/W1546392762","https:\/\/openalex.org\/W1555755354","https:\/\/openalex.org\/W1570998442","https:\/\/openalex.org\/W1572961947","https:\/\/openalex.org\/W1582363331","https:\/\/openalex.org\/W1591746785","https:\/\/openalex.org\/W1748141888","https:\/\/openalex.org\/W1798951030","https:\/\/openalex.org\/W1881580826","https:\/\/openalex.org\/W1964723977","https:\/\/openalex.org\/W1979198062","https:\/\/openalex.org\/W2039274687","https:\/\/openalex.org\/W2066929683","https:\/\/openalex.org\/W2087189997","https:\/\/openalex.org\/W2087368856","https:\/\/openalex.org\/W2112341247","https:\/\/openalex.org\/W2123542192","https:\/\/openalex.org\/W2140721899","https:\/\/openalex.org\/W2149094354","https:\/\/openalex.org\/W2161517294","https:\/\/openalex.org\/W2179628750"],"related_works":["https:\/\/openalex.org\/W2052770116","https:\/\/openalex.org\/W4313014696","https:\/\/openalex.org\/W374805828","https:\/\/openalex.org\/W1993945719","https:\/\/openalex.org\/W4387429380","https:\/\/openalex.org\/W4387191618","https:\/\/openalex.org\/W3080562392","https:\/\/openalex.org\/W26347561","https:\/\/openalex.org\/W2394741334","https:\/\/openalex.org\/W91278585"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}