{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:54:56Z","timestamp":1771703696609,"version":"3.50.1"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_48","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"681-701","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Performance Comparison Between Deep Learning-Based and Conventional Cryptographic Distinguishers"],"prefix":"10.1007","author":[{"given":"Emanuele","family":"Bellini","sequence":"first","affiliation":[]},{"given":"Matteo","family":"Rossi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Al-Saffar, A., Tao, H., Talab, M.A.: Review of deep convolution neural network in image classification. In: 2017 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), pp. 26\u201331 (2017)","DOI":"10.1109\/ICRAMET.2017.8253139"},{"issue":"2","key":"48_CR2","first-page":"163","volume":"9","author":"KM Alallayah","year":"2012","unstructured":"Alallayah, K.M., Alhamami, A.H., AbdElwahed, W., Amin, M.: Applying neural networks for simplified data encryption standard (sdes) cipher system cryptanalysis. Int. Arab J. Inf. Technol. 9(2), 163\u2013169 (2012)","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"1","key":"48_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.3844\/jcssp.2010.29.35","volume":"6","author":"KM Alallayah","year":"2010","unstructured":"Alallayah, K.M., El-Wahed, W.F., Amin, M., Alhamami, A.H.: Attack of against simplified data encryption standard cipher system using neural networks. J. Comput. Sci. 6(1), 29 (2010)","journal-title":"J. Comput. Sci."},{"key":"48_CR4","doi-asserted-by":"publisher","unstructured":"Albrecht, M.R., Leander, G.: An all-in-one approach to differential cryptanalysis for small block ciphers. In: Knudsen, L.R., Wu, H. (eds.) Selected Areas in Cryptography. SAC 2012. Lecture Notes in Computer Science, vol. 7707. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-35999-6_1","DOI":"10.1007\/978-3-642-35999-6_1"},{"key":"48_CR5","doi-asserted-by":"publisher","unstructured":"Andreeva, E., Bogdanov, A., Mennink, B.: Towards understanding the known-key security of block ciphers. In: Moriai, S. (eds.) Fast Software Encryption. FSE 2013. Lecture Notes in Computer Science, vol. 8424. Springer, Berlin, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43933-3_18","DOI":"10.1007\/978-3-662-43933-3_18"},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Awad, W., El-Alfy, E.S.M.: Computational intelligence in cryptology. In: Artificial Intelligence: Concepts, Methodologies, Tools, and Applications, pp. 1636\u20131652. IGI Global (2017)","DOI":"10.4018\/978-1-5225-1759-7.ch065"},{"key":"48_CR7","unstructured":"Baksi, A., Breier, J., Dong, X., Yi, C.: Machine learning assisted differential distinguishers for lightweight ciphers (2020). https:\/\/eprint.iacr.org\/2020\/571.pdf"},{"key":"48_CR8","unstructured":"Bellare, M., Rogaway, P.: Introduction to modern cryptography. UCSD CSE 207, 207 (2005)"},{"key":"48_CR9","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Roy, A., Velichkov, V.: Differential analysis of block ciphers SIMON and SPECK. In: Cid, C., Rechberger, C. (eds.) Fast Software Encryption. FSE 2014. Lecture Notes in Computer Science, vol. 8540. Springer, Berlin, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46706-0_28","DOI":"10.1007\/978-3-662-46706-0_28"},{"key":"48_CR10","doi-asserted-by":"crossref","unstructured":"Chou, J.W., Lin, S.D., Cheng, C.M.: On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, pp. 105\u2013110 (2012)","DOI":"10.1145\/2381896.2381912"},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Danziger, M., Henriques, M.A.A.: Improved cryptanalysis combining differential and artificial neural network schemes. In: 2014 International Telecommunications Symposium (ITS), pp. 1\u20135. IEEE (2014)","DOI":"10.1109\/ITS.2014.6948008"},{"key":"48_CR12","doi-asserted-by":"publisher","unstructured":"Dong, L., Wu, W., Wu, S., Zou, J.: Known-key distinguisher on round-reduced 3D block cipher. In: Jung, S., Yung, M. (eds.) Information Security Applications. WISA 2011. Lecture Notes in Computer Science, vol. 7115. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-27890-7_5","DOI":"10.1007\/978-3-642-27890-7_5"},{"key":"48_CR13","doi-asserted-by":"publisher","unstructured":"Espa\u00f1a-Bonet, C., Fonollosa, J.A.R.: Automatic speech recognition with deep neural networks for impaired speech. In: Abad, A., et al. (eds.) Advances in Speech and Language Technologies for Iberian Languages, pp. 97\u2013107. Springer International Publishing, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49169-1_10","DOI":"10.1007\/978-3-319-49169-1_10"},{"key":"48_CR14","doi-asserted-by":"crossref","unstructured":"Gohr, A.: Improving attacks on round-reduced speck32\/64 using deep learning. In: Advances in Cryptology \u2013 CRYPTO 2019, pp. 150\u2013179. Springer (2019)","DOI":"10.1007\/978-3-030-26951-7_6"},{"key":"48_CR15","unstructured":"Gomez, A.N., Huang, S., Zhang, I., Li, B.M., Osama, M., Kaiser, L.: Unsupervised cipher cracking using discrete gans. arXiv:1801.04883 (2018)"},{"key":"48_CR16","unstructured":"Greydanus, S.: Learning the enigma with recurrent neural networks. arXiv:1708.07576 (2017)"},{"issue":"3","key":"48_CR17","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1111\/j.0824-7935.2004.00250.x","volume":"20","author":"JC Hernandez","year":"2004","unstructured":"Hernandez, J.C., Isasi, P.: Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher tea. Comput. Intell. 20(3), 517\u2013525 (2004)","journal-title":"Comput. Intell."},{"key":"48_CR18","doi-asserted-by":"crossref","unstructured":"Hochreiter, S.: The vanishing gradient problem during learning recurrent neural nets and problem solutions. Int. J. Uncert. Fuzz. Knowl.-Based Syst. 6, 107\u2013116 (1998)","DOI":"10.1142\/S0218488598000094"},{"key":"48_CR19","unstructured":"Jain, A., Kohli, V., Mishra, G.: Deep learning based differential distinguisher for lightweight cipher present (2020). https:\/\/eprint.iacr.org\/2020\/846.pdf"},{"key":"48_CR20","unstructured":"Kingma, D., Ba, J.: Adam: A method for stochastic optimization. In: International Conference on Learning Representations (2014)"},{"key":"48_CR21","doi-asserted-by":"publisher","unstructured":"Klimov, A., Mityagin, A., Shamir, A.: Analysis of neural cryptography. In: Zheng, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2002. ASIACRYPT 2002. Lecture Notes in Computer Science, vol. 2501. Springer, Berlin, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36178-2_18","DOI":"10.1007\/3-540-36178-2_18"},{"key":"48_CR22","doi-asserted-by":"publisher","unstructured":"Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In: Kurosawa, K. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2007. ASIACRYPT 2007. Lecture Notes in Computer Science, vol. 4833. Springer, Berlin, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-76900-2_19","DOI":"10.1007\/978-3-540-76900-2_19"},{"key":"48_CR23","unstructured":"Lagerhjelm, L.: Extracting information from encrypted data using deep neural networks (2018)"},{"key":"48_CR24","doi-asserted-by":"publisher","unstructured":"Laskari, E.C., Meletiou, G.C., Stamatiou, Y.C., Vrahatis, M.N.: Cryptography and cryptanalysis through computational intelligence. In: Nedjah, N., Abraham, A., Mourelle, L..M. (eds.) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol. 57. Springer, Berlin, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71078-3_1","DOI":"10.1007\/978-3-540-71078-3_1"},{"key":"48_CR25","unstructured":"Lecun, Y., Bengio, Y.: Convolutional networks for images, speech, and time-series. The handbook of brain theory and neural networks (1995)"},{"key":"48_CR26","doi-asserted-by":"crossref","unstructured":"Maghrebi, H., Portigliatti, T., Prouff, E.: Breaking cryptographic implementations using deep learning techniques. In: International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 3\u201326. Springer (2016)","DOI":"10.1007\/978-3-319-49445-6_1"},{"issue":"1","key":"48_CR27","first-page":"25","volume":"24","author":"FL de Mello","year":"2018","unstructured":"de Mello, F.L., Xex\u00e9o, J.A.: Identifying encryption algorithms in ECB and CBC modes using computational intelligence. J. UCS 24(1), 25\u201342 (2018)","journal-title":"J. UCS"},{"key":"48_CR28","doi-asserted-by":"publisher","unstructured":"Minier, M., Phan, R.C.W., Pousse, B.: Distinguishers for ciphers and known key attack against Rijndael with large blocks. In: Preneel, B. (eds.) Progress in Cryptology \u2013 AFRICACRYPT 2009. AFRICACRYPT 2009. Lecture Notes in Computer Science, vol. 5580. Springer, Berlin, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02384-2_5","DOI":"10.1007\/978-3-642-02384-2_5"},{"key":"48_CR29","doi-asserted-by":"publisher","unstructured":"Nakahara, J.: New impossible differential and known-key distinguishers for the 3D cipher. In: Bao, F., Weng, J. (eds.) Information Security Practice and Experience. ISPEC 2011. Lecture Notes in Computer Science, vol. 6672. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21031-0_16","DOI":"10.1007\/978-3-642-21031-0_16"},{"key":"48_CR30","doi-asserted-by":"publisher","unstructured":"Nikoli\u0107, I., Pieprzyk, J., Soko\u0142owski, P., Steinfeld, R.: Known and Chosen Key Differential Distinguishers for Block Ciphers. In: Rhee, K.H., Nyang, D. (eds.) Information Security and Cryptology - ICISC 2010. ICISC 2010. Lecture Notes in Computer Science, vol. 6829. Springer, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-24209-0_3","DOI":"10.1007\/978-3-642-24209-0_3"},{"key":"48_CR31","unstructured":"Oliphant, T.E.: A guide to NumPy, vol.\u00a01. Trelgol Publishing USA (2006)"},{"key":"48_CR32","unstructured":"O\u2019Shea, K., Nash, R.: An introduction to convolutional neural networks. CoRR abs\/1511.08458 (2015). http:\/\/arxiv.org\/abs\/1511.08458"},{"key":"48_CR33","unstructured":"Pandey, S., Mishra, M.: Neural cryptanalysis of block cipher. Int. J. 2(5) (2012)"},{"key":"48_CR34","doi-asserted-by":"publisher","unstructured":"Paterson, K.G., Poettering, B., Schuldt, J.C.: big bias hunting in amazonia: large-scale computation and exploitation of RC4 biases (Invited Paper). In: Sarkar, P., Iwata, T. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2014. ASIACRYPT 2014. Lecture Notes in Computer Science, vol. 8873. Springer, Berlin, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_21","DOI":"10.1007\/978-3-662-45611-8_21"},{"key":"48_CR35","first-page":"531","volume":"2017","author":"S Picek","year":"2017","unstructured":"Picek, S., Heuser, A., Guilley, S.: Template attack vs bayes classifier. IACR Cryptol. ePrint Arch. 2017, 531 (2017)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"48_CR36","doi-asserted-by":"publisher","unstructured":"Picek, S., Samiotis, I.P., Kim, J., Heuser, A., Bhasin, S., Legay, A.: On the performance of convolutional neural networks for side-channel analysis. In: Chattopadhyay, A., Rebeiro, C., Yarom, Y. (eds.) Security, Privacy, and Applied Cryptography Engineering. SPACE 2018. Lecture Notes in Computer Science, vol. 11348. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05072-6_10","DOI":"10.1007\/978-3-030-05072-6_10"},{"key":"48_CR37","doi-asserted-by":"crossref","unstructured":"Polim\u00f3n, J., Hernandez-Castro, J., Tapiador, J., Ribagorda, A.: Automated design of a lightweight block cipher with genetic programming. KES J. 12, 3\u201314 (2008)","DOI":"10.3233\/KES-2008-12102"},{"key":"48_CR38","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: Cryptography and machine learning. In: International Conference on the Theory and Application of Cryptology, pp. 427\u2013439. Springer (1991)","DOI":"10.1007\/3-540-57332-1_36"},{"issue":"1","key":"48_CR39","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1587\/transfun.E95.A.21","volume":"95","author":"Y Sasaki","year":"2012","unstructured":"Sasaki, Y.: Known-key attacks on rijndael with large blocks and strengthening shiftrow parameter. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95(1), 21\u201328 (2012)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"48_CR40","doi-asserted-by":"publisher","unstructured":"Sasaki, Y., Emami, S., Hong, D., Kumar, A.: Improved known-key distinguishers on feistel-SP ciphers and application to camellia. In: Susilo, W., Mu, Y., Seberry, J. (eds.) Information Security and Privacy. ACISP 2012. Lecture Notes in Computer Science, vol. 7372. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31448-3_7","DOI":"10.1007\/978-3-642-31448-3_7"},{"key":"48_CR41","doi-asserted-by":"publisher","unstructured":"Sasaki, Y., Yasuda, K.: Known-key distinguishers on 11-round feistel and collision attacks on its hashing modes. In: Joux, A. (eds.) Fast Software Encryption. FSE 2011. Lecture Notes in Computer Science, vol. 6733. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21702-9_23","DOI":"10.1007\/978-3-642-21702-9_23"},{"key":"48_CR42","unstructured":"Smith, L.N.: No more pesky learning rate guessing games. CoRR abs\/1506.01186 (2015). http:\/\/arxiv.org\/abs\/1506.01186"},{"issue":"3","key":"48_CR43","first-page":"135","volume":"4","author":"K Srinivasa Rao","year":"2009","unstructured":"Srinivasa Rao, K., Rama Krishna, M., Bujji, B.: Cryptanalysis of a feistel type block cipher by feed forward neural network using right sigmoidal signals. Int. J. Soft Comput. 4(3), 135\u2013136 (2009)","journal-title":"Int. J. Soft Comput."},{"key":"48_CR44","doi-asserted-by":"crossref","unstructured":"Timon, B.: Non-profiled deep learning-based side-channel attacks with sensitivity analysis. IACR Trans. Cryptograph. Hardware Embed. Syst. 2019(2), 107\u2013131 (2019). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7387","DOI":"10.46586\/tches.v2019.i2.107-131"},{"key":"48_CR45","doi-asserted-by":"publisher","unstructured":"Wheeler, D.J., Needham, R.M.: TEA, a tiny encryption algorithm. In: Preneel, B. (eds.) Fast Software Encryption. FSE 1994. Lecture Notes in Computer Science, vol. 1008. Springer, Berlin, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-60590-8_29","DOI":"10.1007\/3-540-60590-8_29"},{"key":"48_CR46","unstructured":"Xu, B., Wang, N., Chen, T., Li, M.: Empirical evaluation of rectified activations in convolutional network. CoRR abs\/1505.00853 (2015). http:\/\/arxiv.org\/abs\/1505.00853"},{"key":"48_CR47","unstructured":"Yadav, T., Kumar, M.: Differential-ml distinguisher: machine learning based generic extension for differential cryptanalysis (2020). https:\/\/eprint.iacr.org\/2020\/913.pdf"},{"key":"48_CR48","doi-asserted-by":"crossref","unstructured":"Zaid, G., Bossuet, L., Habrard, A., Venelli, A.: Methodology for efficient cnn architectures in profiling attacks. IACR Trans. Cryptogr. Hardware Embed. Syst. 2020(1), 1\u201336 (2019). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8391","DOI":"10.46586\/tches.v2020.i1.1-36"},{"key":"48_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zong, C.: Deep neural networks in machine translation: an overview. IEEE Intell. Syst. 30, 16\u201325 (2015)","DOI":"10.1109\/MIS.2015.69"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:14:28Z","timestamp":1771658068000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_48","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}