{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:29:45Z","timestamp":1765268985079,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031803109"},{"type":"electronic","value":"9783031803116"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80311-6_6","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T01:02:19Z","timestamp":1733965339000},"page":"114-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Deep Learning-Based Differential Distinguishers for\u00a0Cryptographic Sequences"],"prefix":"10.1007","author":[{"given":"Amrita","family":"Bose","sequence":"first","affiliation":[]},{"given":"Debranjan","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Dipanwita","family":"Roy Chowdhury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1007\/978-3-031-09234-3_40","volume-title":"Applied Cryptography and Network Security","author":"N B\u0103cuie\u0163i","year":"2022","unstructured":"B\u0103cuie\u0163i, N., Batina, L., Picek, S.: Deep neural networks aiding cryptanalysis: a case study of the speck distinguisher. In: Ateniese, G., Venturi, D. (eds.) Applied Cryptography and Network Security, pp. 809\u2013829. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-09234-3_40"},{"key":"6_CR2","unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate (2016). https:\/\/arxiv.org\/abs\/1409.0473"},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Baksi, A., Breier, J., Chen, Y., Dong, X.: Machine learning assisted differential distinguishers for lightweight ciphers. In: 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 176\u2013181 (2021). https:\/\/doi.org\/10.23919\/DATE51398.2021.9474092","DOI":"10.23919\/DATE51398.2021.9474092"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Bellini, E., G\u00e9rault, D., Hambitzer, A., Rossi, M.: A cipher-agnostic neural training pipeline with automated finding of good input differences. IACR Trans. Symm. Cryptol. 2023(3), 184\u2013212 (2023). https:\/\/doi.org\/10.46586\/TOSC.V2023.I3.184-212","DOI":"10.46586\/TOSC.V2023.I3.184-212"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/978-3-030-77870-5_28","volume-title":"Advances in Cryptology - EUROCRYPT 2021","author":"A Benamira","year":"2021","unstructured":"Benamira, A., Gerault, D., Peyrin, T., Tan, Q.Q.: A deeper look at machine learning-based cryptanalysis. In: Canteaut, A., Standaert, F.X. (eds.) Advances in Cryptology - EUROCRYPT 2021, pp. 805\u2013835. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_28"},{"key":"6_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption standard","author":"E Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption standard. Springer, New York (1993)"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: Present: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2007, pp. 450\u2013466. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Deng, H., Cao, X., Cheng, Y.: Attention in differential cryptanalysis on lightweight block cipher SPECK. In: 20th Annual International Conference on Privacy, Security and Trust, PST 2023, Copenhagen, Denmark, 21\u201323 August 2023, pp.\u00a01\u20139. IEEE (2023). https:\/\/doi.org\/10.1109\/PST58708.2023.10320201","DOI":"10.1109\/PST58708.2023.10320201"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/978-3-662-53887-6_18","volume-title":"Advances in Cryptology - ASIACRYPT 2016","author":"D Dinu","year":"2016","unstructured":"Dinu, D., Perrin, L., Udovenko, A., Velichkov, V., Gro\u00dfsch\u00e4dl, J., Biryukov, A.: Design strategies for arx with provable bounds: sparx and lax. In: Cheon, J.H., Takagi, T. (eds.) Advances in Cryptology - ASIACRYPT 2016, pp. 484\u2013513. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_18"},{"key":"6_CR10","unstructured":"Gerault, D., Hambitzer, A., Huppert, M., Picek, S.: SoK: 5 years of neural differential cryptanalysis. Cryptology ePrint Archive, Paper 2024\/1300 (2024). https:\/\/eprint.iacr.org\/2024\/1300"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-26951-7_6","volume-title":"Advances in Cryptology - CRYPTO 2019","author":"A Gohr","year":"2019","unstructured":"Gohr, A.: Improving attacks on round-reduced speck32\/64 using deep learning. In: Boldyreva, A., Micciancio, D. (eds.) Advances in Cryptology - CRYPTO 2019, pp. 150\u2013179. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26951-7_6"},{"key":"6_CR12","unstructured":"Gohr, A., Leander, G., Neumann, P.: An assessment of differential-neural distinguishers. Cryptology ePrint Archive, Paper 2022\/1521 (2022). https:\/\/eprint.iacr.org\/2022\/1521"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-3-031-30872-7_19","volume-title":"Topics in Cryptology - CT-RSA 2023","author":"A Hambitzer","year":"2023","unstructured":"Hambitzer, A., Gerault, D., Huang, Y.J., Aaraj, N., Bellini, E.: Nnbits: bit profiling with a deep learning ensemble based distinguisher. In: Rosulek, M. (ed.) Topics in Cryptology - CT-RSA 2023, pp. 493\u2013523. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30872-7_19"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-05149-9_1","volume-title":"Information Security Applications","author":"D Hong","year":"2014","unstructured":"Hong, D., Lee, J.K., Kim, D.C., Kwon, D., Ryu, K.H., Lee, D.G.: Lea: a 128-bit block cipher for fast encryption on common processors. In: Kim, Y., Lee, H., Perrig, A. (eds.) Information Security Applications, pp. 3\u201327. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05149-9_1"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11894063_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D Hong","year":"2006","unstructured":"Hong, D., et al.: Hight: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2006, pp. 46\u201359. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_4"},{"key":"6_CR16","unstructured":"Jain, A., Kohli, V., Mishra, G.: Deep learning based differential distinguisher for lightweight block ciphers (2021). https:\/\/arxiv.org\/abs\/2112.05061"},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1186\/S42400-023-00176-7","volume":"6","author":"J Liu","year":"2023","unstructured":"Liu, J., Ren, J., Chen, S.: A deep learning aided differential distinguisher improvement framework with more lightweight and universality. Cybersecur. 6(1), 47 (2023). https:\/\/doi.org\/10.1186\/S42400-023-00176-7","journal-title":"Cybersecur."},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Lyu, L., Tu, Y., Zhang, Y.: Improving the deep-learning-based differential distinguisher and applications to simeck. In: 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 465\u2013470 (2022). https:\/\/doi.org\/10.1109\/CSCWD54268.2022.9776036","DOI":"10.1109\/CSCWD54268.2022.9776036"},{"key":"6_CR19","doi-asserted-by":"publisher","unstructured":"Mishra, G., Pal, S.K., Krishna\u00a0Murthy, S.V.S.S.N.V.G., Prakash, I., Kumar, A.: Deep learning-based differential distinguisher for lightweight ciphers gift-64 and pride. In: Agrawal, S., Gupta, K.K., Chan, J.H., Agrawal, J., Gupta, M. (eds.) Machine Intelligence and Smart Systems, pp. 245\u2013257. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-9650-3_19","DOI":"10.1007\/978-981-16-9650-3_19"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Pal, D., Chaudhury, M., Das, A., Chowdhury, D.R.: Deep learning-based differential distinguishers for nist standard authenticated encryption and permutations. In: Giri, D., Vaidya, J., Ponnusamy, S., Lin, Z., Joshi, K.P., Yegnanarayanan, V. (eds.) Proceedings of the Tenth International Conference on Mathematics and Computing. pp. 1\u201313. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-97-2069-9_1","DOI":"10.1007\/978-981-97-2069-9_1"},{"key":"6_CR21","unstructured":"Pal, D., Mandal, U., Chaudhury, M., Das, A., Chowdhury, D.R.: A deep neural differential distinguisher for ARX based block cipher. Cryptology ePrint Archive, Paper 2022\/1195 (2022). https:\/\/eprint.iacr.org\/2022\/1195"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-981-99-2264-2_4","volume-title":"Applications and Techniques in Information Security","author":"D Pal","year":"2023","unstructured":"Pal, D., Mandal, U., Das, A., Chowdhury, D.R.: Deep learning based differential classifier of pride and rc5. In: Prabhu, S., Pokhrel, S.R., Li, G. (eds.) Applications and Techniques in Information Security, pp. 46\u201358. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-2264-2_4"},{"key":"6_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/J.JISA.2024.103758","volume":"82","author":"D Shen","year":"2024","unstructured":"Shen, D., Song, Y., Lu, Y., Long, S., Tian, S.: Neural differential distinguishers for GIFT-128 and ASCON. J. Inf. Secur. Appl. 82, 103758 (2024). https:\/\/doi.org\/10.1016\/J.JISA.2024.103758","journal-title":"J. Inf. Secur. Appl."},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-642-23951-9_23","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2011","author":"K Shibutani","year":"2011","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2011, pp. 342\u2013357. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_23"},{"key":"6_CR25","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol.\u00a027. Curran Associates, Inc. (2014)"},{"key":"6_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/J.JISA.2023.103531","volume":"76","author":"W Teng","year":"2023","unstructured":"Teng, W., Teh, J.S., Jamil, N.: On the security of lightweight block ciphers against neural distinguishers: Observations on lbc-iot and SLIM. J. Inf. Secur. Appl. 76, 103531 (2023). https:\/\/doi.org\/10.1016\/J.JISA.2023.103531","journal-title":"J. Inf. Secur. Appl."},{"key":"6_CR27","unstructured":"Vaswani, A., et al.: Attention is all you need (2023). https:\/\/arxiv.org\/abs\/1706.03762"},{"key":"6_CR28","doi-asserted-by":"publisher","unstructured":"Wang, G., Wang, G., He, Y.: Improved machine learning assisted (related-key) differential distinguishers for lightweight ciphers. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 164\u2013171 (2021). https:\/\/doi.org\/10.1109\/TrustCom53373.2021.00039","DOI":"10.1109\/TrustCom53373.2021.00039"},{"key":"6_CR29","unstructured":"Zhang, L., Wang, Z.: Improving differential-neural distinguisher model for des, chaskey, and present (2022). https:\/\/arxiv.org\/abs\/2204.06341"},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"Zhang, R., Zhang, M., Yan, J., Li, Y., Wu, X., Li, L.: Differential cryptanalysis of twegift-128 based on neural network. In: 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), pp. 529\u2013534 (2021). https:\/\/doi.org\/10.1109\/DSC53577.2021.00084","DOI":"10.1109\/DSC53577.2021.00084"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80311-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T01:02:40Z","timestamp":1733965360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80311-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9783031803109","9783031803116"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80311-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}