Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2016-03-10

AUTHORS

Hongbo Yu, Yonglin Hao, Dongxia Bai

ABSTRACT

For an n-bit random permutation, there are three types of boomerang distinguishers, denoted as Type I, II and III, with generic complexities 2n, 2n/3 and 2n/2 respectively. In this paper, we try to evaluate the security margins of three hash functions namely SHA-512, SHA-256 and DHA-256 against the boomerang attack. Firstly, we give a boomerang attack on 48-step SHA-512 with a practical complexity of 251. The correctness of this attack is verified by providing a Type III boomerang quartet. Then, we extend the existing differential characteristics of the three hash functions to more rounds. We deduce the sufficient conditions and give thorough evaluations to the security margins as follows: Type I boomerang method can attack 54-step SHA-512, 51-step SHA-256 and 46-step DHA-256 with complexities 2480, 2218 and 2236 respectively. Type II boomerang method can attack 51-step SHA-512, 49-step SHA-256 and 43-step DHA-256 with complexities 2158.50, 272.91 and 274.50 respectively. Type III boomerang method can attack 52-step SHA-512, 50-step SHA-256 and 44-step DHA-256 with complexities 2223.80, 2123.63 and 299.85 respectively. More... »

PAGES

052110

References to SciGraph publications

  • 2008-01-01. Collisions for Step-Reduced SHA-256 in FAST SOFTWARE ENCRYPTION
  • 2011. Boomerang Attacks on BLAKE-32 in FAST SOFTWARE ENCRYPTION
  • 2002-09-13. A Generalized Birthday Problem in ADVANCES IN CRYPTOLOGY — CRYPTO 2002
  • 2001-04-15. The Rectangle Attack — Rectangling the Serpent in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2001
  • 2006. Analysis of Step-Reduced SHA-256 in FAST SOFTWARE ENCRYPTION
  • 2005. How to Break MD5 and Other Hash Functions in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2005
  • 2013. Boomerang and Slide-Rotational Analysis of the SM3 Hash Function in SELECTED AREAS IN CRYPTOGRAPHY
  • 2011. Boomerang Distinguisher for the SIMD-512 Compression Function in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2011
  • 2012. Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2012. Boomerang Distinguishers for Full HAS-160 Compression Function in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2011. Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2012. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family in FAST SOFTWARE ENCRYPTION
  • 2011. Second-Order Differential Collisions for Reduced SHA-256 in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2012. Boomerang Attacks on Hash Function Using Auxiliary Differentials in TOPICS IN CRYPTOLOGY – CT-RSA 2012
  • 2005. Related-Key Boomerang and Rectangle Attacks in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2005
  • 2013. Improved Boomerang Attacks on SM3 in INFORMATION SECURITY AND PRIVACY
  • 2009. Preimage Attacks on Reduced Tiger and SHA-2 in FAST SOFTWARE ENCRYPTION
  • 2008. New Collision Attacks against Up to 24-Step SHA-2 in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008
  • 2005. Finding Collisions in the Full SHA-1 in ADVANCES IN CRYPTOLOGY – CRYPTO 2005
  • 2010. Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010
  • 2013. Improving Local Collisions: New Attacks on Reduced SHA-256 in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2013
  • 2013. The Boomerang Attacks on the Round-Reduced Skein-512 in SELECTED AREAS IN CRYPTOGRAPHY
  • 1999. The Boomerang Attack in FAST SOFTWARE ENCRYPTION
  • 2001. Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent in FAST SOFTWARE ENCRYPTION
  • 2009. Collisions and Other Non-random Properties for Step-Reduced SHA-256 in SELECTED AREAS IN CRYPTOGRAPHY
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s11432-015-5389-4

    DOI

    http://dx.doi.org/10.1007/s11432-015-5389-4

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1037811094


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information Systems", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0899", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Other Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China", 
              "id": "http://www.grid.ac/institutes/grid.12527.33", 
              "name": [
                "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Yu", 
            "givenName": "Hongbo", 
            "id": "sg:person.016610273711.70", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016610273711.70"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China", 
              "id": "http://www.grid.ac/institutes/grid.12527.33", 
              "name": [
                "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hao", 
            "givenName": "Yonglin", 
            "id": "sg:person.014270173173.47", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014270173173.47"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China", 
              "id": "http://www.grid.ac/institutes/grid.12527.33", 
              "name": [
                "Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Bai", 
            "givenName": "Dongxia", 
            "id": "sg:person.013743431562.21", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013743431562.21"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-04159-4_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006448938", 
              "https://doi.org/10.1007/978-3-642-04159-4_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-25578-6_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049283242", 
              "https://doi.org/10.1007/978-3-642-25578-6_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-21702-9_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042747819", 
              "https://doi.org/10.1007/978-3-642-21702-9_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44706-7_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027439548", 
              "https://doi.org/10.1007/3-540-44706-7_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-25385-0_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007374185", 
              "https://doi.org/10.1007/978-3-642-25385-0_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-27954-6_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045885768", 
              "https://doi.org/10.1007/978-3-642-27954-6_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11799313_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031289693", 
              "https://doi.org/10.1007/11799313_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-35999-6_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003203060", 
              "https://doi.org/10.1007/978-3-642-35999-6_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-89754-5_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038460261", 
              "https://doi.org/10.1007/978-3-540-89754-5_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029279784", 
              "https://doi.org/10.1007/3-540-44987-6_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-25385-0_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044111889", 
              "https://doi.org/10.1007/978-3-642-25385-0_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-71039-4_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013423878", 
              "https://doi.org/10.1007/978-3-540-71039-4_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-34117-5_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041585859", 
              "https://doi.org/10.1007/978-3-642-34117-5_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-38348-9_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042094376", 
              "https://doi.org/10.1007/978-3-642-38348-9_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48519-8_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014543668", 
              "https://doi.org/10.1007/3-540-48519-8_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03317-9_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014081407", 
              "https://doi.org/10.1007/978-3-642-03317-9_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-34047-5_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007746451", 
              "https://doi.org/10.1007/978-3-642-34047-5_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45708-9_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008389113", 
              "https://doi.org/10.1007/3-540-45708-9_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11426639_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043264875", 
              "https://doi.org/10.1007/11426639_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-35999-6_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021234960", 
              "https://doi.org/10.1007/978-3-642-35999-6_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11535218_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002819603", 
              "https://doi.org/10.1007/11535218_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-31284-7_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024472788", 
              "https://doi.org/10.1007/978-3-642-31284-7_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-39059-3_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050069461", 
              "https://doi.org/10.1007/978-3-642-39059-3_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11426639_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037593715", 
              "https://doi.org/10.1007/11426639_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17373-8_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037751989", 
              "https://doi.org/10.1007/978-3-642-17373-8_4"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2016-03-10", 
        "datePublishedReg": "2016-03-10", 
        "description": "For an n-bit random permutation, there are three types of boomerang distinguishers, denoted as Type I, II and III, with generic complexities 2n, 2n/3 and 2n/2 respectively. In this paper, we try to evaluate the security margins of three hash functions namely SHA-512, SHA-256 and DHA-256 against the boomerang attack. Firstly, we give a boomerang attack on 48-step SHA-512 with a practical complexity of 251. The correctness of this attack is verified by providing a Type III boomerang quartet. Then, we extend the existing differential characteristics of the three hash functions to more rounds. We deduce the sufficient conditions and give thorough evaluations to the security margins as follows: Type I boomerang method can attack 54-step SHA-512, 51-step SHA-256 and 46-step DHA-256 with complexities 2480, 2218 and 2236 respectively. Type II boomerang method can attack 51-step SHA-512, 49-step SHA-256 and 43-step DHA-256 with complexities 2158.50, 272.91 and 274.50 respectively. Type III boomerang method can attack 52-step SHA-512, 50-step SHA-256 and 44-step DHA-256 with complexities 2223.80, 2123.63 and 299.85 respectively.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s11432-015-5389-4", 
        "inLanguage": "en", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1135989", 
            "issn": [
              "1009-2757", 
              "1674-733X"
            ], 
            "name": "Science China Information Sciences", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "5", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "59"
          }
        ], 
        "keywords": [
          "SHA-512", 
          "SHA-256", 
          "type I", 
          "security margin", 
          "hash function", 
          "boomerang attack", 
          "thorough evaluation", 
          "attacks", 
          "practical complexity", 
          "random permutation", 
          "boomerang distinguishers", 
          "margin", 
          "function", 
          "complexity", 
          "correctness", 
          "differential characteristics", 
          "more rounds", 
          "evaluation", 
          "permutations", 
          "types", 
          "distinguisher", 
          "characteristics", 
          "rounds", 
          "method", 
          "sufficient conditions", 
          "conditions", 
          "paper", 
          "quartet"
        ], 
        "name": "Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack", 
        "pagination": "052110", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1037811094"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s11432-015-5389-4"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s11432-015-5389-4", 
          "https://app.dimensions.ai/details/publication/pub.1037811094"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-06-01T22:16", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/article/article_693.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s11432-015-5389-4"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11432-015-5389-4'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11432-015-5389-4'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11432-015-5389-4'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11432-015-5389-4'


     

    This table displays all metadata directly associated to this object as RDF triples.

    208 TRIPLES      22 PREDICATES      80 URIs      45 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s11432-015-5389-4 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 anzsrc-for:0806
    4 anzsrc-for:0899
    5 schema:author N57178f8fcdb245a39b5dfeedc9c44827
    6 schema:citation sg:pub.10.1007/11426639_2
    7 sg:pub.10.1007/11426639_30
    8 sg:pub.10.1007/11535218_2
    9 sg:pub.10.1007/11799313_9
    10 sg:pub.10.1007/3-540-44706-7_6
    11 sg:pub.10.1007/3-540-44987-6_21
    12 sg:pub.10.1007/3-540-45708-9_19
    13 sg:pub.10.1007/3-540-48519-8_12
    14 sg:pub.10.1007/978-3-540-71039-4_1
    15 sg:pub.10.1007/978-3-540-89754-5_8
    16 sg:pub.10.1007/978-3-642-03317-9_9
    17 sg:pub.10.1007/978-3-642-04159-4_18
    18 sg:pub.10.1007/978-3-642-17373-8_4
    19 sg:pub.10.1007/978-3-642-21702-9_13
    20 sg:pub.10.1007/978-3-642-25385-0_15
    21 sg:pub.10.1007/978-3-642-25385-0_16
    22 sg:pub.10.1007/978-3-642-25578-6_19
    23 sg:pub.10.1007/978-3-642-27954-6_14
    24 sg:pub.10.1007/978-3-642-31284-7_17
    25 sg:pub.10.1007/978-3-642-34047-5_15
    26 sg:pub.10.1007/978-3-642-34117-5_10
    27 sg:pub.10.1007/978-3-642-35999-6_19
    28 sg:pub.10.1007/978-3-642-35999-6_20
    29 sg:pub.10.1007/978-3-642-38348-9_16
    30 sg:pub.10.1007/978-3-642-39059-3_17
    31 schema:datePublished 2016-03-10
    32 schema:datePublishedReg 2016-03-10
    33 schema:description For an n-bit random permutation, there are three types of boomerang distinguishers, denoted as Type I, II and III, with generic complexities 2n, 2n/3 and 2n/2 respectively. In this paper, we try to evaluate the security margins of three hash functions namely SHA-512, SHA-256 and DHA-256 against the boomerang attack. Firstly, we give a boomerang attack on 48-step SHA-512 with a practical complexity of 251. The correctness of this attack is verified by providing a Type III boomerang quartet. Then, we extend the existing differential characteristics of the three hash functions to more rounds. We deduce the sufficient conditions and give thorough evaluations to the security margins as follows: Type I boomerang method can attack 54-step SHA-512, 51-step SHA-256 and 46-step DHA-256 with complexities 2480, 2218 and 2236 respectively. Type II boomerang method can attack 51-step SHA-512, 49-step SHA-256 and 43-step DHA-256 with complexities 2158.50, 272.91 and 274.50 respectively. Type III boomerang method can attack 52-step SHA-512, 50-step SHA-256 and 44-step DHA-256 with complexities 2223.80, 2123.63 and 299.85 respectively.
    34 schema:genre article
    35 schema:inLanguage en
    36 schema:isAccessibleForFree false
    37 schema:isPartOf N31e31f0632184c23a48fd45133d98ea4
    38 N6f994f8d8e504e79809830eeb7b5700a
    39 sg:journal.1135989
    40 schema:keywords SHA-256
    41 SHA-512
    42 attacks
    43 boomerang attack
    44 boomerang distinguishers
    45 characteristics
    46 complexity
    47 conditions
    48 correctness
    49 differential characteristics
    50 distinguisher
    51 evaluation
    52 function
    53 hash function
    54 margin
    55 method
    56 more rounds
    57 paper
    58 permutations
    59 practical complexity
    60 quartet
    61 random permutation
    62 rounds
    63 security margin
    64 sufficient conditions
    65 thorough evaluation
    66 type I
    67 types
    68 schema:name Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
    69 schema:pagination 052110
    70 schema:productId N8aa1a5b0158e4433b8488ea33aa8a1c2
    71 N9b361ef329f84f5cb86ddaf3bca95153
    72 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037811094
    73 https://doi.org/10.1007/s11432-015-5389-4
    74 schema:sdDatePublished 2022-06-01T22:16
    75 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    76 schema:sdPublisher N7ab04aec926449f385af2fe844e7c75e
    77 schema:url https://doi.org/10.1007/s11432-015-5389-4
    78 sgo:license sg:explorer/license/
    79 sgo:sdDataset articles
    80 rdf:type schema:ScholarlyArticle
    81 N2facced412414e648c146cdf11be6a7a rdf:first sg:person.013743431562.21
    82 rdf:rest rdf:nil
    83 N31e31f0632184c23a48fd45133d98ea4 schema:issueNumber 5
    84 rdf:type schema:PublicationIssue
    85 N57178f8fcdb245a39b5dfeedc9c44827 rdf:first sg:person.016610273711.70
    86 rdf:rest N87ade62770894ab0837a8b27ba642a7c
    87 N6f994f8d8e504e79809830eeb7b5700a schema:volumeNumber 59
    88 rdf:type schema:PublicationVolume
    89 N7ab04aec926449f385af2fe844e7c75e schema:name Springer Nature - SN SciGraph project
    90 rdf:type schema:Organization
    91 N87ade62770894ab0837a8b27ba642a7c rdf:first sg:person.014270173173.47
    92 rdf:rest N2facced412414e648c146cdf11be6a7a
    93 N8aa1a5b0158e4433b8488ea33aa8a1c2 schema:name doi
    94 schema:value 10.1007/s11432-015-5389-4
    95 rdf:type schema:PropertyValue
    96 N9b361ef329f84f5cb86ddaf3bca95153 schema:name dimensions_id
    97 schema:value pub.1037811094
    98 rdf:type schema:PropertyValue
    99 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    100 schema:name Information and Computing Sciences
    101 rdf:type schema:DefinedTerm
    102 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    103 schema:name Data Format
    104 rdf:type schema:DefinedTerm
    105 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
    106 schema:name Information Systems
    107 rdf:type schema:DefinedTerm
    108 anzsrc-for:0899 schema:inDefinedTermSet anzsrc-for:
    109 schema:name Other Information and Computing Sciences
    110 rdf:type schema:DefinedTerm
    111 sg:journal.1135989 schema:issn 1009-2757
    112 1674-733X
    113 schema:name Science China Information Sciences
    114 schema:publisher Springer Nature
    115 rdf:type schema:Periodical
    116 sg:person.013743431562.21 schema:affiliation grid-institutes:grid.12527.33
    117 schema:familyName Bai
    118 schema:givenName Dongxia
    119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013743431562.21
    120 rdf:type schema:Person
    121 sg:person.014270173173.47 schema:affiliation grid-institutes:grid.12527.33
    122 schema:familyName Hao
    123 schema:givenName Yonglin
    124 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014270173173.47
    125 rdf:type schema:Person
    126 sg:person.016610273711.70 schema:affiliation grid-institutes:grid.12527.33
    127 schema:familyName Yu
    128 schema:givenName Hongbo
    129 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016610273711.70
    130 rdf:type schema:Person
    131 sg:pub.10.1007/11426639_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043264875
    132 https://doi.org/10.1007/11426639_2
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/11426639_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037593715
    135 https://doi.org/10.1007/11426639_30
    136 rdf:type schema:CreativeWork
    137 sg:pub.10.1007/11535218_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002819603
    138 https://doi.org/10.1007/11535218_2
    139 rdf:type schema:CreativeWork
    140 sg:pub.10.1007/11799313_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031289693
    141 https://doi.org/10.1007/11799313_9
    142 rdf:type schema:CreativeWork
    143 sg:pub.10.1007/3-540-44706-7_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027439548
    144 https://doi.org/10.1007/3-540-44706-7_6
    145 rdf:type schema:CreativeWork
    146 sg:pub.10.1007/3-540-44987-6_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029279784
    147 https://doi.org/10.1007/3-540-44987-6_21
    148 rdf:type schema:CreativeWork
    149 sg:pub.10.1007/3-540-45708-9_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008389113
    150 https://doi.org/10.1007/3-540-45708-9_19
    151 rdf:type schema:CreativeWork
    152 sg:pub.10.1007/3-540-48519-8_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014543668
    153 https://doi.org/10.1007/3-540-48519-8_12
    154 rdf:type schema:CreativeWork
    155 sg:pub.10.1007/978-3-540-71039-4_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013423878
    156 https://doi.org/10.1007/978-3-540-71039-4_1
    157 rdf:type schema:CreativeWork
    158 sg:pub.10.1007/978-3-540-89754-5_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038460261
    159 https://doi.org/10.1007/978-3-540-89754-5_8
    160 rdf:type schema:CreativeWork
    161 sg:pub.10.1007/978-3-642-03317-9_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014081407
    162 https://doi.org/10.1007/978-3-642-03317-9_9
    163 rdf:type schema:CreativeWork
    164 sg:pub.10.1007/978-3-642-04159-4_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006448938
    165 https://doi.org/10.1007/978-3-642-04159-4_18
    166 rdf:type schema:CreativeWork
    167 sg:pub.10.1007/978-3-642-17373-8_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037751989
    168 https://doi.org/10.1007/978-3-642-17373-8_4
    169 rdf:type schema:CreativeWork
    170 sg:pub.10.1007/978-3-642-21702-9_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042747819
    171 https://doi.org/10.1007/978-3-642-21702-9_13
    172 rdf:type schema:CreativeWork
    173 sg:pub.10.1007/978-3-642-25385-0_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044111889
    174 https://doi.org/10.1007/978-3-642-25385-0_15
    175 rdf:type schema:CreativeWork
    176 sg:pub.10.1007/978-3-642-25385-0_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007374185
    177 https://doi.org/10.1007/978-3-642-25385-0_16
    178 rdf:type schema:CreativeWork
    179 sg:pub.10.1007/978-3-642-25578-6_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049283242
    180 https://doi.org/10.1007/978-3-642-25578-6_19
    181 rdf:type schema:CreativeWork
    182 sg:pub.10.1007/978-3-642-27954-6_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045885768
    183 https://doi.org/10.1007/978-3-642-27954-6_14
    184 rdf:type schema:CreativeWork
    185 sg:pub.10.1007/978-3-642-31284-7_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024472788
    186 https://doi.org/10.1007/978-3-642-31284-7_17
    187 rdf:type schema:CreativeWork
    188 sg:pub.10.1007/978-3-642-34047-5_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007746451
    189 https://doi.org/10.1007/978-3-642-34047-5_15
    190 rdf:type schema:CreativeWork
    191 sg:pub.10.1007/978-3-642-34117-5_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041585859
    192 https://doi.org/10.1007/978-3-642-34117-5_10
    193 rdf:type schema:CreativeWork
    194 sg:pub.10.1007/978-3-642-35999-6_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021234960
    195 https://doi.org/10.1007/978-3-642-35999-6_19
    196 rdf:type schema:CreativeWork
    197 sg:pub.10.1007/978-3-642-35999-6_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003203060
    198 https://doi.org/10.1007/978-3-642-35999-6_20
    199 rdf:type schema:CreativeWork
    200 sg:pub.10.1007/978-3-642-38348-9_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042094376
    201 https://doi.org/10.1007/978-3-642-38348-9_16
    202 rdf:type schema:CreativeWork
    203 sg:pub.10.1007/978-3-642-39059-3_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050069461
    204 https://doi.org/10.1007/978-3-642-39059-3_17
    205 rdf:type schema:CreativeWork
    206 grid-institutes:grid.12527.33 schema:alternateName Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China
    207 schema:name Department of Computer Science and Technology, Tsinghua Universtiy, 100084, Beijing, China
    208 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...