RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 8

Model architecture level privacy leakage in neural networks
Li, Yan; Yan, Hongyang; Huang, Teng; Pan, Zijie; Lai, Jiewei; Zhang, Xiaoxue; Chen, Kongyang; Li, Jin
Sci China Inf Sci, 2024, 67(3): 132101
Keywords: neural architecture search; data reconstruction attack; membership inference attack
Cite as: Li Y, Yan H Y, Huang T, et al. Model architecture level privacy leakage in neural networks. Sci China Inf Sci, 2024, 67(3): 132101, doi: 10.1007/s11432-022-3507-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 6

Transaction transmission model for blockchain channels based on non-cooperative games
Zhang, Peiyun; Li, Chenxi; Zhou, Mengchu; Huang, Wenjun; Abusorrah, Abdullah; Bamasag, Omaimah O.
Sci China Inf Sci, 2023, 66(1): 112105
Keywords: Blockchain channel; transaction transmission; channel balance; channel state; channel transmission probability; non-cooperative game
Cite as: Zhang P Y, Li C X, Zhou M C, et al. Transaction transmission model for blockchain channels based on non-cooperative games. Sci China Inf Sci, 2023, 66(1): 112105, doi: 10.1007/s11432-021-3362-9

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 5

Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy
Guo, Xiaojie; Li, Jin; Liu, Zheli; Wei, Yu; Zhang, Xiao; Dong, Changyu
Sci China Inf Sci, 2022, 65(5): 152106
Keywords: data sharing; homomorphic encryption; blockchain; smart contract; game theory
Cite as: Guo X J, Li J, Liu Z L, et al. Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy. Sci China Inf Sci, 2022, 65(5): 152106, doi: 10.1007/s11432-020-2940-8

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 4

A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis
Zhang, Kai; Lai, Xuejia; Wang, Lei; Guan, Jie; Hu, Bin
Sci China Inf Sci, 2023, 66(3): 139106
Keywords: cybersecurity; cryptanalysis; lightweight block cipher; impossible differential cryptanalysis; Simeck
Cite as: Zhang K, Lai X J, Wang L, et al. A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis. Sci China Inf Sci, 2023, 66(3): 139106, doi: 10.1007/s11432-022-3466-x

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 4

A benchmark for visual analysis of insider threat detection
Zhao, Ying; Yang, Kui; Chen, Siming; Zhang, Zhuo; Huang, Xin; Li, Qiusheng; Ma, Qi; Luan, Xinyue; Fan, Xiaoping
Sci China Inf Sci, 2022, 65(9): 199102
Keywords: visual analytics; visualization; evaluation; benchmark; intellligence analysis
Cite as: Zhao Y, Yang K, Chen S M, et al. A benchmark for visual analysis of insider threat detection. Sci China Inf Sci, 2022, 65(9): 199102, doi: 10.1007/s11432-019-2776-4

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 3

Lattice-based autonomous path proxy re-encryption in the standard model
Xie, Wenli; Weng, Jian; Tong, Yao; Liang, Xiaojian; Yao, Lisha; Zhao, Feixiang
Sci China Inf Sci, 2023, 66(10): 202101
Keywords: autonomous path proxy re-encryption; proxy re-encryption; lattice-based cryptography; learning with errors; controlled delegation
Cite as: Xie W L, Weng J, Tong Y, et al. Lattice-based autonomous path proxy re-encryption in the standard model. Sci China Inf Sci, 2023, 66(10): 202101, doi: 10.1007/s11432-022-3612-6

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 3

Forward and backward secure searchable encryption with multi-keyword search and result verification
Cui, Jie; Sun, Yue; Xu, Yan; Tian, Miaomiao; Zhong, Hong
Sci China Inf Sci, 2022, 65(5): 159102
Keywords: forward security; backward security; multi-keyword search; verification; searchable encryption
Cite as: Cui J, Sun Y, Xu Y, et al. Forward and backward secure searchable encryption with multi-keyword search and result verification. Sci China Inf Sci, 2022, 65(5): 159102, doi: 10.1007/s11432-019-2668-x

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 3

Pseudorandom number generator based on supersingular elliptic curve isogenies
Huang, Yan; Zhang, Fangguo; Liu, Zhijie; Tian, Haibo
Sci China Inf Sci, 2022, 65(5): 159101
Keywords: post-quantum cryptography; pseudorandom generator; supersingular elliptic curve isogenies; decisional supersingular product; indistinguishability
Cite as: Huang Y, Zhang F G, Liu Z J, et al. Pseudorandom number generator based on supersingular elliptic curve isogenies. Sci China Inf Sci, 2022, 65(5): 159101, doi: 10.1007/s11432-019-2669-6

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 3

Cube attacks on round-reduced MORUS and Gimli
Chen, Siwei; Xiang, Zejun; Zeng, Xiangyong; Zhang, Shasha
Sci China Inf Sci, 2022, 65(1): 119101
Keywords: cube attack; division property; morus; gimli; authenticated encryption
Cite as: Chen S W, Xiang Z J, Zeng X Y, et al. Cube attacks on round-reduced MORUS and Gimli. Sci China Inf Sci, 2022, 65(1): 119101, doi: 10.1007/s11432-019-2742-6

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
Ghopur, Dilxat; Ma, Jianfeng; Ma, Xindi; Miao, Yinbin; Hao, Jialu; Jiang, Tao
Sci China Inf Sci, 2023, 66(7): 172104
Keywords: ciphertext-policy attribute-based encryption; puncturable encryption; user revocation; outsource decryption; digital signature
Cite as: Ghopur D, Ma J F, Ma X D, et al. Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation. Sci China Inf Sci, 2023, 66(7): 172104, doi: 10.1007/s11432-022-3585-9

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
Xiang, Axin; Gao, Hongfeng; Tian, Youliang; Wan, Liang
Sci China Inf Sci, 2023, 66(3): 139102
Keywords: key escrow; blockchain; smart contract; committee selection; anonymous authentication
Cite as: Xiang A X, Gao H F, Tian Y L, et al. DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. Sci China Inf Sci, 2023, 66(3): 139102, doi: 10.1007/s11432-021-3378-3

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

An anonymous key agreement protocol with robust authentication for smart grid infrastructure
Chen, Ting; Cheng, Qingfeng; Li, Xinghua
Sci China Inf Sci, 2022, 65(9): 199101
Keywords: smart grid infrastructure; impersonation attack; perfect forward security; ephemeral key compromise attack; key agreement
Cite as: Chen T, Cheng Q F, Li X H. An anonymous key agreement protocol with robust authentication for smart grid infrastructure. Sci China Inf Sci, 2022, 65(9): 199101, doi: 10.1007/s11432-019-2736-5

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks
Xing, Junchi; Wu, Chunming; Zhou, Haifeng; Cheng, Qiumei; Yu, Danrui; Macas, Mayra
Sci China Inf Sci, 2022, 65(8): 189102
Keywords: intrusion prevention system; middlebox scaling; software-defined network; security; resource utilization
Cite as: Xing J C, Wu C M, Zhou H F, et al. Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks. Sci China Inf Sci, 2022, 65(8): 189102, doi: 10.1007/s11432-019-2731-7

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

Malware incident response (IR) informed by cyber threat intelligence (CTI)
He, Ying; Inglut, Ellis; Luo, Cunjin
Sci China Inf Sci, 2022, 65(7): 179105
Keywords: malware analysis; cyber threat intelligence; crypto jacking; incident response; malware incident response
Cite as: He Y, Inglut E, Luo C J. Malware incident response (IR) informed by cyber threat intelligence (CTI). Sci China Inf Sci, 2022, 65(7): 179105, doi: 10.1007/s11432-019-2774-4

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

A small first-order DPA resistant AES implementation with no fresh randomness
Wei, Man; Sun, Siwei; Wei, Zihao; Gong, Zheng; Hu, Lei
Sci China Inf Sci, 2022, 65(6): 169102
Keywords: side channel analysis; dpa; threshold implementation; domain-oriented masking; aes
Cite as: Wei M, Sun S W, Wei Z H, et al. A small first-order DPA resistant AES implementation with no fresh randomness. Sci China Inf Sci, 2022, 65(6): 169102, doi: 10.1007/s11432-019-1469-7

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

A CCA secure public key encryption scheme based on finite groups of Lie type
Hong, Haibo; Shao, Jun; Wang, Licheng; Xie, Mande; Wei, Guiyi; Yang, Yixian; Han, Song; Lin, Jianhong
Sci China Inf Sci, 2022, 65(1): 119102
Keywords: finite groups of lie type; exponential mapping; public key encryption; non-abelian factoring assumption; non-abelian inserting assumption
Cite as: Hong H B, Shao J, Wang L C, et al. A CCA secure public key encryption scheme based on finite groups of Lie type. Sci China Inf Sci, 2022, 65(1): 119102, doi: 10.1007/s11432-019-2704-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Unbalanced private set intersection with linear communication complexity
Zhao, Quanyu; Jiang, Bingbing; Zhang, Yuan; Wang, Heng; Mao, Yunlong; Zhong, Sheng
Sci China Inf Sci, 2024, 67(3): 132105
Keywords: unbalanced private set intersection; Hash proof system; linear communication complexity; small set; resource-constrained devices
Cite as: Zhao Q Y, Jiang B B, Zhang Y, et al. Unbalanced private set intersection with linear communication complexity. Sci China Inf Sci, 2024, 67(3): 132105, doi: 10.1007/s11432-022-3717-9

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
Yao, Lisha; Hou, Lin; Weng, Jian; Zhao, Feixiang
Sci China Inf Sci, 2024, 67(1): 119101
Keywords: attribute-based; keyword search; chosen-keyword attacks; insider keyword guessing attacks; ideal lattices
Cite as: Yao L S, Hou L, Weng J, et al. Provably secure attribute-based authenticated encryption with keyword search from ideal lattices. Sci China Inf Sci, 2024, 67(1): 119101, doi: 10.1007/s11432-022-3808-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Resource investment for DDoS attack resistant SDN: a practical assessment
Yuan, Bin; Zhang, Fan; Wan, Jun; Zhao, Huan; Yu, Shui; Zou, Deqing; Hua, Qiangsheng; Jin, Hai
Sci China Inf Sci, 2023, 66(7): 172103
Keywords: SDN security; DDoS attacks; resource management; queueing theory; QoS
Cite as: Yuan B, Zhang F, Wan J, et al. Resource investment for DDoS attack resistant SDN: a practical assessment. Sci China Inf Sci, 2023, 66(7): 172103, doi: 10.1007/s11432-022-3593-7

From CAS & CAE Members
RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Locally differentially private high-dimensional data synthesis
Chen, Xue; Wang, Cheng; Yang, Qing; Hu, Teng; Jiang, Changjun
Sci China Inf Sci, 2023, 66(1): 112101
Keywords: preserving protocols local differential privacy; high-dimensional data synthesis; sampling; data privacy; privacy-
Cite as: Chen X, Wang C, Yang Q, et al. Locally differentially private high-dimensional data synthesis. Sci China Inf Sci, 2023, 66(1): 112101, doi: 10.1007/s11432-022-3583-x

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Hierarchical group signature with verifier-local revocation revisited
Hou, Lin; Lin, Dongdai; Liu, Renzhang
Sci China Inf Sci, 2022, 65(8): 189103
Keywords: group signature; hierarchical group signature; verifier-local revocation; generic construction; lattice-based cryptography
Cite as: Hou L, Lin D D, Liu R Z. Hierarchical group signature with verifier-local revocation revisited. Sci China Inf Sci, 2022, 65(8): 189103, doi: 10.1007/s11432-019-2709-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

SAND: semi-automated adaptive network defense via programmable rule generation and deployment
Chen, Haoyu; Zou, Deqing; Jin, Hai; Xu, Shouhuai; Yuan, Bin
Sci China Inf Sci, 2022, 65(7): 172102
Keywords: network defense; adaptive defense; automated defense; programmable defense; security services; software-defined networking; security management
Cite as: Chen H Y, Zou D Q, Jin H, et al. SAND: semi-automated adaptive network defense via programmable rule generation and deployment. Sci China Inf Sci, 2022, 65(7): 172102, doi: 10.1007/s11432-020-3193-2

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Generalizing Lyubashevsky-Wichs trapdoor sampler for NTRU lattices
Tao, Yang; Ji, Yunfeng; Zhang, Rui
Sci China Inf Sci, 2022, 65(5): 159103
Keywords: trapdoor sampler; ntru lattice; hash-and-sign; lattice-based signature; post-quantum cryptography
Cite as: Tao Y, Ji Y F, Zhang R. Generalizing Lyubashevsky-Wichs trapdoor sampler for NTRU lattices. Sci China Inf Sci, 2022, 65(5): 159103, doi: 10.1007/s11432-019-2699-6

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Constant-round auction with insulated bidders
Ma, Jie; Qi, Bin; Lv, Kewei
Sci China Inf Sci, 2022, 65(4): 149102
Keywords: auction; commitment; integer comparison protocol; constant-round; blockchain
Cite as: Ma J, Qi B, Lv K W. Constant-round auction with insulated bidders. Sci China Inf Sci, 2022, 65(4): 149102, doi: 10.1007/s11432-019-2666-8

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Correlation leakage analysis based on masking schemes
Zhang, Jiawei; Niu, Yongchuan; Wang, An
Sci China Inf Sci, 2022, 65(2): 129101
Keywords: correlation leakage analysis; correlation leakage model; second-order analysis; side-channel attack; masking schemes
Cite as: Zhang J W, Niu Y C, Wang A. Correlation leakage analysis based on masking schemes. Sci China Inf Sci, 2022, 65(2): 129101, doi: 10.1007/s11432-019-2719-2

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Blockchain-based immunization against kleptographic attacks
Jiang, Changsong; Xu, Chunxiang; Chen, Jie; Chen, Kefei
Sci China Inf Sci, 2024, 67(7): 172102
Keywords: kleptographic attacks; subliminal channel; blockchain; immunization; randomized algorithm
Cite as: Jiang C S, Xu C X, Chen J, et al. Blockchain-based immunization against kleptographic attacks. Sci China Inf Sci, 2024, 67(7): 172102, doi: 10.1007/s11432-023-3883-4

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm
Li, Teng; Lin, Weiguo; Ma, Ruichen; Ma, Zhuo; Shen, Yulong; Ma, Jianfeng
Sci China Inf Sci, 2024, 67(5): 159103
Keywords: UAV swarm; cooperative detection; privacy protection; consensus; decentralization
Cite as: Li T, Lin W G, Ma R C, et al. CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm. Sci China Inf Sci, 2024, 67(5): 159103, doi: 10.1007/s11432-023-3984-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Fault-tolerant identity-based encryption from SM9
Liu, Xiaohong; Huang, Xinyi; Cheng, Zhaohui; Wu, Wei
Sci China Inf Sci, 2024, 67(2): 122101
Keywords: attribute-based encryption; identity-based encryption; fault-tolerant; SM9
Cite as: Liu X H, Huang X Y, Cheng Z H, et al. Fault-tolerant identity-based encryption from SM9. Sci China Inf Sci, 2024, 67(2): 122101, doi: 10.1007/s11432-022-3706-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

TULAM: trajectory-user linking via attention mechanism
Li, Hao; Cao, Shuyu; Chen, Yaqing; Zhang, Min; Feng, Dengguo
Sci China Inf Sci, 2024, 67(1): 112103
Keywords: information security; data security and privacy; trajectory-user linking; deep learning; recurrent neural network; attention mechanism
Cite as: Li H, Cao S Y, Chen Y Q, et al. TULAM: trajectory-user linking via attention mechanism. Sci China Inf Sci, 2024, 67(1): 112103, doi: 10.1007/s11432-021-3673-6

RESEARCH PAPER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Framework for understanding intention-unbreakable malware
Ji, Tiantian; Fang, Binxing; Cui, Xiang; Wang, Zhongru; Liao, Peng; Song, Shouyou
Sci China Inf Sci, 2023, 66(4): 142104
Keywords: malware; unbreakable property; modeling mechanism; accurate identification; intention concealment
Cite as: Ji T T, Fang B X, Cui X, et al. Framework for understanding intention-unbreakable malware. Sci China Inf Sci, 2023, 66(4): 142104, doi: 10.1007/s11432-021-3567-y

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

An empirical study of security issues in SSO server-side implementations
Wang, Hui; Gu, Dawu; Zhang, Yuanyuan; Hu, Yikun
Sci China Inf Sci, 2022, 65(7): 179104
Keywords: single sign-on; oauth; openid connect; federated identity management; access control
Cite as: Wang H, Gu D W, Zhang Y Y, et al. An empirical study of security issues in SSO server-side implementations. Sci China Inf Sci, 2022, 65(7): 179104, doi: 10.1007/s11432-019-2697-1

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Lattice-based group encryptions with only one trapdoor
Pan, Jing; Zhang, Jiang; Zhang, Fangguo; Chen, Xiaofeng; Susilo, Willy
Sci China Inf Sci, 2022, 65(5): 152304
Keywords: lattice cryptography; group encryptions; lattice trapdoors; accumulators; zero-knowledge
Cite as: Pan J, Zhang J, Zhang F G, et al. Lattice-based group encryptions with only one trapdoor. Sci China Inf Sci, 2022, 65(5): 152304, doi: 10.1007/s11432-020-3226-6

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

On the bit-based division property of S-boxes
Xiang, Zejun; Zeng, Xiangyong; Zhang, Shasha
Sci China Inf Sci, 2022, 65(4): 149101
Keywords: division property; sbox; anf; divisional optimal; divisional suboptimal
Cite as: Xiang Z J, Zeng X Y, Zhang S S. On the bit-based division property of S-boxes. Sci China Inf Sci, 2022, 65(4): 149101, doi: 10.1007/s11432-019-2634-7

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Improved nonlinear invariant attack
Tong, Haipeng; Shen, Xuan; Li, Chao; Liu, Yunwen
Sci China Inf Sci, 2022, 65(3): 139103
Keywords: nonlinear invariant attack; 4-bit optimal s-boxes; q-equivalence; fides; distinguishing attack
Cite as: Tong H P, Shen X, Li C, et al. Improved nonlinear invariant attack. Sci China Inf Sci, 2022, 65(3): 139103, doi: 10.1007/s11432-019-2632-1

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Ciphertext-only fault analysis of GIFT lightweight cryptosystem
Li, Wei; Cao, Shan; Gu, Dawu; Li, Jiayao; Cai, Tianpei; Wang, Menglin; Sun, Li; Liu, Zhiqiang; Liu, Ya
Sci China Inf Sci, 2022, 65(3): 139102
Keywords: lightweight cryptosystem; gift; ciphertext-only fault analysis; cryptanalysis; fault analysis
Cite as: Li W, Cao S, Gu D W, et al. Ciphertext-only fault analysis of GIFT lightweight cryptosystem. Sci China Inf Sci, 2022, 65(3): 139102, doi: 10.1007/s11432-019-2629-y

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix
Liu, Jun; Rijmen, Vincent; Hu, Yupu; Chen, Jie; Wang, Baocang
Sci China Inf Sci, 2022, 65(3): 132302
Keywords: white-box cryptography; block cipher; design; addition/rotation/xor; efficiency improvement
Cite as: Liu J, Rijmen V, Hu Y P, et al. WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix. Sci China Inf Sci, 2022, 65(3): 132302, doi: 10.1007/s11432-020-3105-1

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

A detailed analysis of primal attack and its variants
Zhang, Xue; Zheng, Zhongxiang; Wang, Xiaoyun
Sci China Inf Sci, 2022, 65(3): 132301
Keywords: crytanalysis; lattice-based cryptography; learning with errors problem; primal attack; unique-svp
Cite as: Zhang X, Zheng Z X, Wang X Y. A detailed analysis of primal attack and its variants. Sci China Inf Sci, 2022, 65(3): 132301, doi: 10.1007/s11432-020-2958-9

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Related-tweakey impossible differential attack on QARMA-128
Du, Juan; Wang, Wei; Li, Muzhou; Wang, Meiqin
Sci China Inf Sci, 2022, 65(2): 129102
Keywords: tweakable block cipher; qarma; impossible differential; related tweakey; milp
Cite as: Du J, Wang W, Li M Z, et al. Related-tweakey impossible differential attack on QARMA-128. Sci China Inf Sci, 2022, 65(2): 129102, doi: 10.1007/s11432-019-2628-9