{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:00:32Z","timestamp":1770537632179,"version":"3.49.0"},"reference-count":45,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":305,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2701900"],"award-info":[{"award-number":["2022YFB2701900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472172"],"award-info":[{"award-number":["62472172"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072181"],"award-info":[{"award-number":["62072181"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>\n                    At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. At fast software encryption (FSE) 2024, Bellini et al. provided a generic tool to automatically train the (related\u2010key) differential neural distinguishers for different block ciphers. In this paper, based on the intrinsic principle of differential cryptanalysis and neural distinguisher, we propose a superior (related\u2010key) differential neural distinguisher that uses the ciphertext pairs generated by two different differences. In addition, we give a framework to automatically train our (related\u2010key) differential neural distinguisher with four steps: difference selection, sample generation, training pipeline, and evaluation scheme. To demonstrate the effectiveness of our approach, we apply it to the block ciphers: Simon, Speck, Simeck, and Hight. Compared to the existing results, our method can provide improved accuracy and even increase the number of rounds that can be analyzed. The source codes are available in\n                    <jats:ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"https:\/\/github.com\/differentialdistinguisher\/AutoND_New\">https:\/\/github.com\/differentialdistinguisher\/AutoND_New<\/jats:ext-link>\n                    .\n                  <\/jats:p>","DOI":"10.1049\/2024\/4097586","type":"journal-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T11:48:54Z","timestamp":1730461734000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A New (Related\u2010Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis"],"prefix":"10.1049","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8921-7545","authenticated-orcid":false,"given":"Gao","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2121-9306","authenticated-orcid":false,"given":"Gaoli","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3058-2377","authenticated-orcid":false,"given":"Siwei","family":"Sun","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2024,11]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"e_1_2_9_2_2","series-title":"Lecture Notes in Computer Science","first-page":"366","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u201994","author":"Matsui M.","year":"1994"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44953-1_37"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2017.i1.358-379"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_6"},{"key":"e_1_2_9_7_2","doi-asserted-by":"crossref","unstructured":"BeaulieuR. ShorsD. SmithJ. Treatman-ClarkS. WeeksB. andWingersL. The SIMON and SPECK Lightweight Block Ciphers Proceedings of the 52nd Annual Design Automation Conference 2015 ACM 1\u20136.","DOI":"10.1145\/2744769.2747946"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_15"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22963-3_11"},{"key":"e_1_2_9_11_2","doi-asserted-by":"crossref","unstructured":"HeK. ZhangX. RenS. andSunJ. Deep Residual Learning for Image Recognition Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2016 Las Vegas NV USA IEEE 770\u2013778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_2_9_12_2","doi-asserted-by":"crossref","unstructured":"HuangG. LiuZ. Van Der MaatenL. andWeinbergerK. Q. Densely Connected Convolutional Networks Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2017 CVF 4700\u20134708.","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_2_9_13_2","doi-asserted-by":"crossref","unstructured":"HuJ. ShenL. andSunG. Squeeze-and-Excitation Networks Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2018 CVF 7132\u20137141.","DOI":"10.1109\/CVPR.2018.00745"},{"key":"e_1_2_9_14_2","doi-asserted-by":"crossref","unstructured":"SzegedyC. LiuW. andJiaY. et al.Going Deeper With Convolutions Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2015 CVF 1\u20139.","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"e_1_2_9_15_2","unstructured":"ZhangL. WangZ. andWangB. Improving Differential-Neural Cryptanalysis With Inception 2022 Cryptology ePrint Archive."},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2022EDL8094"},{"key":"e_1_2_9_17_2","unstructured":"GohrA. LeanderG. andNeumannP. An Assessment of Differential-Neural Distinguishers 2022 Cryptology ePrint Archive."},{"key":"e_1_2_9_18_2","doi-asserted-by":"crossref","unstructured":"BelliniE. GeraultD. HambitzerA. andRossiM. A Cipher-Agnostic Neural Training Pipeline With Automated Finding of Good Input Differences 2022 Cryptology ePrint Archive.","DOI":"10.46586\/tosc.v2023.i3.184-212"},{"key":"e_1_2_9_19_2","unstructured":"YuF.andKoltunV. Multi-Scale Context Aggregation by Dilated Convolutions 2015 arXiv preprint arXiv: 1511.07122."},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6522-6_6"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35999-6_1"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_28"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxac019"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13051-4_19"},{"key":"e_1_2_9_25_2","volume-title":"Federal Information Processing Standards Publication","author":"DE Standard","year":"1999"},{"key":"e_1_2_9_26_2","unstructured":"BertoniG. DaemenJ. PeetersM. andVan AsscheG. Keccak Annual International Conference on the Theory and Applications of Cryptographic Techniques 2013 Berlin Heidelberg Springer 313\u2013314."},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103461"},{"key":"e_1_2_9_28_2","doi-asserted-by":"crossref","unstructured":"WangG. WangG. andHeY. Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers 2021 IEEE 20th International Conference on Trust Security and Privacy in Computing and Communications (TrustCom) 2021 Shenyang China IEEE 164\u2013171.","DOI":"10.1109\/TrustCom53373.2021.00039"},{"key":"e_1_2_9_29_2","series-title":"Lecture Notes in Computer Science","first-page":"3","volume-title":"Information Security and Cryptology","author":"Su H.-C.","year":"2020"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7564678"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-3261-z"},{"key":"e_1_2_9_32_2","doi-asserted-by":"crossref","unstructured":"ChauhanR. GhanshalaK. K. andJoshiR. Convolutional Neural Network (CNN) for Image Detection and Recognition 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC) 2018 Jalandhar India IEEE 278\u2013282.","DOI":"10.1109\/ICSCCC.2018.8703316"},{"key":"e_1_2_9_33_2","unstructured":"HijaziS. KumarR. andRowenC. Using Convolutional Neural Networks for Image Recognition 2015 Cadence Design Systems Inc.: San Jose CA USA vol. 9 no. 1."},{"key":"e_1_2_9_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778011"},{"key":"e_1_2_9_35_2","doi-asserted-by":"crossref","unstructured":"XuZ. YangY. andHauptmannA. G. A Discriminative CNN Video Representation for Event Detection Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2015 CVF 1798\u20131807.","DOI":"10.1109\/CVPR.2015.7298789"},{"key":"e_1_2_9_36_2","unstructured":"YinW. KannK. YuM. andSch\u00fctzeH. Comparative Study of Cnn and Rnn for Natural Language Processing 2017 arXiv preprint arXiv: 1702.01923."},{"key":"e_1_2_9_37_2","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwx110"},{"key":"e_1_2_9_38_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxac195"},{"key":"e_1_2_9_39_2","unstructured":"JainA. KohliV. andMishraG. Deep Learning Based Differential Distinguisher for Lightweight Cipher Present 2020 Cryptology ePrint Archive."},{"key":"e_1_2_9_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"e_1_2_9_41_2","unstructured":"BernsteinD. J. Bernstein and Others ChaCha A Variant of salsa20 2008 Workshop record of sasc 2008 vol. 8 pp. 3\u20135."},{"key":"e_1_2_9_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"e_1_2_9_43_2","unstructured":"ReddiS. J. KaleS. andKumarS. On the Convergence of Adam and Beyond 2019 arXiv preprint arXiv: 1904.09237."},{"key":"e_1_2_9_44_2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-319-25417-3","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2015","author":"Yang G.","year":"2015"},{"key":"e_1_2_9_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_4"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/2024\/4097586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T08:55:38Z","timestamp":1762332938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/2024\/4097586"}},"subtitle":[],"editor":[{"given":"Qichun","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1049\/2024\/4097586"],"URL":"https:\/\/doi.org\/10.1049\/2024\/4097586","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"2024-05-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"4097586"}}