{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:15:43Z","timestamp":1742912143405,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031624940"},{"type":"electronic","value":"9783031624957"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62495-7_43","type":"book-chapter","created":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T20:19:24Z","timestamp":1719001164000},"page":"569-580","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Analysis of\u00a0Cryptographic Algorithms: Hints from\u00a0Machine Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4281-6809","authenticated-orcid":false,"given":"Mattia","family":"Paravisi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5689-8575","authenticated-orcid":false,"given":"Andrea","family":"Visconti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7574-697X","authenticated-orcid":false,"given":"Dario","family":"Malchiodi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,22]]},"reference":[{"key":"43_CR1","doi-asserted-by":"publisher","first-page":"60960","DOI":"10.1109\/ACCESS.2021.3074268","volume":"9","author":"E Ahmadzadeh","year":"2021","unstructured":"Ahmadzadeh, E., Kim, H., Jeong, O., Moon, I.: A novel dynamic attack on classical ciphers using an attention-based LSTM encoder-decoder model. IEEE Access 9, 60960\u201360970 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3074268","journal-title":"IEEE Access"},{"key":"43_CR2","doi-asserted-by":"publisher","unstructured":"Alani, M.M.: Applications of machine learning in cryptography: a survey. In: Proceedings of the 3rd International Conference on cryptography, security and privacy (ICCSP \u201919), pp. 23\u201327. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3309074.3309092","DOI":"10.1145\/3309074.3309092"},{"key":"43_CR3","series-title":"Lecture Notes in Computer Science()","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-030-10970-7_8","volume-title":"Selected Areas in Cryptography - SAC 2018","author":"R Ankele","year":"2018","unstructured":"Ankele, R., K\u00f6lbl, S.: Mind the gap - a closer look at the security of block ciphers against differential cryptanalysis. In: Cid, C., Jacobson, M., Jr. (eds.) Selected Areas in Cryptography - SAC 2018. Lecture Notes in Computer Science(), vol. 11349, pp. 163\u2013190. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-10970-7_8"},{"key":"43_CR4","doi-asserted-by":"publisher","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference, pp.\u00a01\u20136. Association for Computing Machinery, New York (2015).https:\/\/doi.org\/10.1145\/2744769.2747946","DOI":"10.1145\/2744769.2747946"},{"key":"43_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-981-99-7563-1_13","volume-title":"Cryptology and Network Security","author":"E Bellini","year":"2023","unstructured":"Bellini, E., et al.: Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives. In: Deng, J., Kolesnikov, V., Schwarzmann, A.A. (eds.) Cryptology and Network Security. Lecture Notes in Computer Science, vol. 14342, pp. 268\u2013292. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-7563-1_13"},{"key":"43_CR6","doi-asserted-by":"publisher","unstructured":"Bellini, E., De\u00a0Piccoli, A., Makarim, R., Polese, S., Riva, L., Visconti, A.: New records of pre-image search of reduced SHA-1 using SAT solvers. In: Giri, D., Raymond Choo, KK., Ponnusamy, S., Meng, W., Akleylek, S., Prasad Maity, S. (eds.) Proceedings of the Seventh International Conference on Mathematics and Computing. Advances in Intelligent Systems and Computing, vol. 1412, pp. 141\u2013151. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-6890-6_11","DOI":"10.1007\/978-981-16-6890-6_11"},{"key":"43_CR7","unstructured":"CLAASP: a cryptographic library for the automated analysis of symmetric primitives. https:\/\/github.com\/Crypto-TII\/claasp"},{"issue":"2","key":"43_CR8","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/JPROC.2005.862300","volume":"94","author":"C De Canniere","year":"2006","unstructured":"De Canniere, C., Biryukov, A., Preneel, B.: An introduction to block cipher cryptanalysis. Proc. IEEE 94(2), 346\u2013356 (2006). https:\/\/doi.org\/10.1109\/JPROC.2005.862300","journal-title":"Proc. IEEE"},{"key":"43_CR9","unstructured":"Focardi, R., Luccio, F.: Neural cryptanalysis of classical ciphers. In: Proceedings of the 19th Italian Conference on Theoretical Computer Science (ICTCS 2018), pp. 104\u2013115 (2018)"},{"key":"43_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-26951-7_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"A Gohr","year":"2019","unstructured":"Gohr, A.: Improving attacks on round-reduced speck32\/64 using deep learning. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11693, pp. 150\u2013179. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26951-7_6"},{"key":"43_CR11","unstructured":"Gomez, A.N., Huang, S., Zhang, I., Li, B.M., Osama, M., Kaiser, L.: Unsupervised cipher cracking using discrete GANs (2018). https:\/\/arxiv.org\/abs\/1801.04883, arXiv preprint: arXiv:1801.04883"},{"key":"43_CR12","doi-asserted-by":"publisher","unstructured":"Khadivi, P., Momtazpour, M.: Cipher-text classification with data mining. In: 2010 IEEE 4th International Symposium on Advanced Networks and Telecommunication Systems, Mumbai, India, pp. 64\u201366. IEEE (2010). https:\/\/doi.org\/10.1109\/ANTS.2010.5983530","DOI":"10.1109\/ANTS.2010.5983530"},{"key":"43_CR13","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-031-47372-2_5","volume-title":"Advances in Computing","author":"I Mart\u00ednez","year":"2023","unstructured":"Mart\u00ednez, I., L\u00f3pez, V., Rambaut, D., Obando, G., Gauthier-Uma\u00f1a, V., P\u00e9rez, J.F.: Recent advances in machine learning for differential cryptanalysis. In: Tabares, M., Vallejo, P., Suarez, B., Suarez, M., Ruiz, O., Aguilar, J. (eds.) Advances in Computing. Communications in Computer and Information Science, vol. 1924, pp. 45\u201356. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-47372-2_5"},{"key":"43_CR14","doi-asserted-by":"publisher","unstructured":"Mehmood, Z., Sultan, A., Khan, F., Tahir, S.: Machine learning based encrypted content type identification. In: 2023 International Conference on Communication Technologies (ComTech), pp. 117\u2013122. IEEE (2023). https:\/\/doi.org\/10.1109\/ComTech57708.2023.10164955","DOI":"10.1109\/ComTech57708.2023.10164955"},{"key":"43_CR15","unstructured":"Simon and speck implementation guide. https:\/\/nsacyber.github.io\/simon-speck\/implementations\/"},{"key":"43_CR16","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"43_CR17","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1038\/s42256-019-0048-x","volume":"1","author":"C Rudin","year":"2019","unstructured":"Rudin, C.: Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead. Nat. Mach. Intell. 1, 206\u2013215 (2019). https:\/\/doi.org\/10.1038\/s42256-019-0048-x","journal-title":"Nat. Mach. Intell."},{"key":"43_CR18","doi-asserted-by":"publisher","first-page":"269","DOI":"10.46586\/tosc.v2021.i1.269-315","volume":"1","author":"L Sun","year":"2021","unstructured":"Sun, L., Wang, W., Wang, M.: Accelerating the search of differential and linear characteristics with the sat method. IACR Trans. Symmetric Cryptol. 1, 269\u2013315 (2021). https:\/\/doi.org\/10.46586\/tosc.v2021.i1.269-315","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"1","key":"43_CR19","doi-asserted-by":"publisher","first-page":"8","DOI":"10.47852\/bonviewJCCE2202261","volume":"3","author":"R Verma","year":"2024","unstructured":"Verma, R., Kumari, A., Anand, A., Yadavalli, V.: Revisiting shift cipher technique for amplified data security. J. Comput. Cogn. Eng. 3(1), 8\u201314 (2024). https:\/\/doi.org\/10.47852\/bonviewJCCE2202261","journal-title":"J. Comput. Cogn. Eng."}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62495-7_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T20:24:56Z","timestamp":1719001496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62495-7_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031624940","9783031624957"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62495-7_43","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"22 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"EANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering Applications of Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Corfu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eann2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eannconf.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}