{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T03:35:52Z","timestamp":1776742552001,"version":"3.51.2"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T00:00:00Z","timestamp":1776729600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T00:00:00Z","timestamp":1776729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s00521-026-11973-9","type":"journal-article","created":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T02:37:17Z","timestamp":1776739037000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Key recovery attack on PRESENT using an entropy-based neural distinguisher"],"prefix":"10.1007","volume":"38","author":[{"given":"Val\u00e9rie","family":"Gauthier-Uma\u00f1a","sequence":"first","affiliation":[]},{"given":"Isabella","family":"Mart\u00ednez","sequence":"additional","affiliation":[]},{"given":"Germ\u00e1n","family":"Obando","sequence":"additional","affiliation":[]},{"given":"Juan F.","family":"P\u00e9rez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,21]]},"reference":[{"key":"11973_CR1","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2016","unstructured":"Stallings W (2016) Cryptography and Network Security: Principles and Practice, 7th edn. Pearson, Boston, MA","edition":"7"},{"key":"11973_CR2","doi-asserted-by":"publisher","DOI":"10.1201\/9781351133036","volume-title":"Introduction to modern cryptography","author":"J Katz","year":"2020","unstructured":"Katz J, Lindell Y (2020) Introduction to modern cryptography, 3rd edn. Chapman and Hall\/CRC, Boca Raton, FL","edition":"3"},{"key":"11973_CR3","unstructured":"Menezes AJ, Vanstone SA, Van Oorschot PC (1996) Handbook of applied cryptography. CRC Press, Boca Raton, FL. https:\/\/cacr.uwaterloo.ca\/hac\/"},{"key":"11973_CR4","unstructured":"ISO Central Secretary: ISO\/IEC 29192-2:2019 Information security \u2013 Lightweight cryptography \u2013 Part 2: Block ciphers. (2019) Standard ISO\/IEC 29192-2:2019, International Organization for Standardization, Geneva, CH. https:\/\/www.iso.org\/standard\/78477.html"},{"key":"11973_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of des-like cryptosystems. J Cryptol 4:3\u201372","journal-title":"J Cryptol"},{"key":"11973_CR6","doi-asserted-by":"crossref","unstructured":"Gohr A (2019) Improving attacks on round-reduced speck32\/64 using deep learning. In: Advances in Cryptology\u2013CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18\u201322 August 2019, Proceedings, Part II 39, Springer, pp 150\u2013179","DOI":"10.1007\/978-3-030-26951-7_6"},{"key":"11973_CR7","unstructured":"Hou Z, Ren J, Chen S (2021) Improve Neural Distinguisher for Cryptanalysis. Cryptology ePrint Archive, 2021\/1017. Preprint at https:\/\/eprint.iacr.org\/2021\/1017"},{"key":"11973_CR8","unstructured":"Gohr A, Leander G, Neumann P (2022) An Assessment of Differential-Neural Distinguishers. Cryptology ePrint Archive, 2022\/1521. Preprint at https:\/\/eprint.iacr.org\/2022\/1521"},{"key":"11973_CR9","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic hardware and embedded systems \u2013CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: Paillier P, Verbauwhede I (eds) Cryptographic hardware and embedded systems \u2013CHES 2007. Springer, Berlin, Heidelberg, pp 450\u2013466"},{"key":"11973_CR10","doi-asserted-by":"publisher","unstructured":"Chen J, Miyaji A, Su C, Teh JS (2015) Improved differential characteristic searching methods. In: 2015 IEEE 2nd international conference on cyber security and cloud computing. https:\/\/doi.org\/10.1109\/CSCloud.2015.42","DOI":"10.1109\/CSCloud.2015.42"},{"key":"11973_CR11","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-68164-9_4","volume-title":"Progress in Cryptology - AFRICACRYPT 2008","author":"M Wang","year":"2008","unstructured":"Wang M (2008) Differential cryptanalysis of reduced-round PRESENT. In: Vaudenay S (ed) Progress in Cryptology - AFRICACRYPT 2008. Springer, Berlin, Heidelberg, pp 40\u201349"},{"issue":"3","key":"11973_CR12","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/0161-110291890885","volume":"26","author":"HM Heys","year":"2002","unstructured":"Heys HM (2002) A tutorial on linear and differential cryptanalysis. Cryptologia 26(3):189\u2013221","journal-title":"Cryptologia"},{"key":"11973_CR13","doi-asserted-by":"publisher","unstructured":"Baksi A, Breier J, Chen Y, Dong X (2021) Machine learning assisted differential distinguishers for lightweight ciphers. In: 2021 design, automation & test in Europe conference & exhibition (DATE), pp 176\u2013181. https:\/\/doi.org\/10.23919\/DATE51398.2021.9474092","DOI":"10.23919\/DATE51398.2021.9474092"},{"issue":"6","key":"11973_CR14","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1093\/comjnl\/bxac019","volume":"66","author":"Y Chen","year":"2022","unstructured":"Chen Y, Shen Y, Yu H, Yuan S (2022) A new neural distinguisher considering features derived from multiple ciphertext Pairs. Comput J 66(6):1419\u20131433. https:\/\/doi.org\/10.1093\/comjnl\/bxac019","journal-title":"Comput J"},{"key":"11973_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-71852-7_1","volume-title":"Information security and cryptology","author":"H-C Su","year":"2021","unstructured":"Su H-C, Zhu X-Y, Ming D (2021) Polytopic attack on round-reduced simon32\/64 using deep learning. In: Wu Y, Yung M (eds) Information security and cryptology. Springer, Cham, pp 3\u201320"},{"key":"11973_CR16","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1007\/978-3-031-09234-3_40","volume-title":"Applied cryptography and network security","author":"N B\u0103cuieti","year":"2022","unstructured":"B\u0103cuieti N, Batina L, Picek S (2022) Deep neural networks aiding cryptanalysis: a case study of the speck distinguisher. In: Ateniese G, Venturi D (eds) Applied cryptography and network security. Springer, Cham, pp 809\u2013829"},{"key":"11973_CR17","unstructured":"Dani J, Nakka K, Saxena N (2024) A machine learning-based framework for assessing cryptographic indistinguishability of lightweight block ciphers. Preprint at arXiv:2405.19683. https:\/\/arxiv.org\/abs\/2405.19683"},{"key":"11973_CR18","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-031-47372-2_5","volume-title":"Advances in computing","author":"I Mart\u00ednez","year":"2024","unstructured":"Mart\u00ednez I, L\u00f3pez V, Rambaut D, Obando G, Gauthier-Uma\u00f1a V, P\u00e9rez JF (2024) Recent advances in machine learning for differential cryptanalysis. In: Tabares M, Vallejo P, Suarez B, Suarez M, Ruiz O, Aguilar J (eds) Advances in computing. Springer, Cham, pp 45\u201356"},{"key":"11973_CR19","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1186\/s42400-024-00258-0","volume":"7","author":"W Wu","year":"2024","unstructured":"Wu W, Guo M (2024) Improved integral neural distinguisher model for lightweight cipher PRESENT. Cybersecurity 7:65. https:\/\/doi.org\/10.1186\/s42400-024-00258-0","journal-title":"Cybersecurity"},{"key":"11973_CR20","doi-asserted-by":"crossref","unstructured":"Bellini E, Brunelli R, Gerault D, Hambitzer A, Pedicini M (2025) Generic Partial Decryption as Feature Engineering for Neural Distinguishers. Cryptology ePrint Archive, Paper 2025\/1443. Preprint at https:\/\/eprint.iacr.org\/2025\/1443","DOI":"10.1007\/978-3-032-06754-8_14"},{"key":"11973_CR21","volume-title":"Elements of information theory","author":"TM Cover","year":"2006","unstructured":"Cover TM, Thomas JA (2006) Elements of information theory, 2nd edn. Wiley-Interscience, Hoboken, NJ","edition":"2"},{"issue":"1","key":"11973_CR22","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.aci.2018.08.003","volume":"17","author":"A Tharwat","year":"2021","unstructured":"Tharwat A (2021) Classification assessment methods. Appl Comp Inf 17(1):168\u2013192. https:\/\/doi.org\/10.1016\/j.aci.2018.08.003","journal-title":"Appl Comp Inf"},{"issue":"153","key":"11973_CR23","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1080\/01621459.1926.10502161","volume":"21","author":"HA Sturges","year":"1926","unstructured":"Sturges HA (1926) The choice of a class interval. J Am Stat Assoc 21(153):65\u201366. https:\/\/doi.org\/10.1080\/01621459.1926.10502161","journal-title":"J Am Stat Assoc"},{"key":"11973_CR24","doi-asserted-by":"publisher","unstructured":"Mart\u00ednez I, Gauthier-Uma\u00f1a V, Obando G, P\u00e9rez JF (2025) Entropy-based Neural Distinguisher for PRESENT: Code and Data. Zenodo. Source code and datasets for reproducing the experiments. https:\/\/doi.org\/10.5281\/zenodo.16826468","DOI":"10.5281\/zenodo.16826468"},{"issue":"1","key":"11973_CR25","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/JPROC.2015.2494218","volume":"104","author":"B Shahriari","year":"2016","unstructured":"Shahriari B, Swersky K, Wang Z, Adams RP, Freitas N (2016) Taking the human out of the loop: a review of bayesian optimization. Proc IEEE 104(1):148\u2013175","journal-title":"Proc IEEE"},{"key":"11973_CR26","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-540-71039-4_23","volume-title":"Fast software encryption","author":"MR Z\u2019aba","year":"2008","unstructured":"Z\u2019aba MR, Raddum H, Henricksen M, Dawson E (2008) Bit-pattern based integral attack. In: Nyberg K (ed) Fast software encryption. Springer, Berlin, Heidelberg, pp 363\u2013381"},{"key":"11973_CR27","doi-asserted-by":"crossref","unstructured":"Banik S, Pandey SK, Peyrin T, Sasaki Y, Sim SM, Todo Y (2017) GIFT: A small PRESENT: Towards reaching the limit of lightweight encryption. In: International conference on cryptographic hardware and embedded systems. Springer, pp 321\u2013345","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"11973_CR28","doi-asserted-by":"crossref","unstructured":"Beierle C, Jean J, K\u00f6lbl S, Leander G, Moradi A, Peyrin T, Sasaki Y, Sasdrich P, Sim SM (2016) The skinny family of block ciphers and its low-latency variant mantis. In: Annual international cryptology conference. Springer, pp 123\u2013153","DOI":"10.1007\/978-3-662-53008-5_5"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-026-11973-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-026-11973-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-026-11973-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T02:37:23Z","timestamp":1776739043000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-026-11973-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,21]]},"references-count":28,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["11973"],"URL":"https:\/\/doi.org\/10.1007\/s00521-026-11973-9","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,21]]},"assertion":[{"value":"17 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"305"}}