{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:37:38Z","timestamp":1775745458112,"version":"3.50.1"},"reference-count":34,"publisher":"Oxford University Press (OUP)","issue":"11","license":[{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/pages\/standard-publication-reuse-rights"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272147"],"award-info":[{"award-number":["62272147"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12471492"],"award-info":[{"award-number":["12471492"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFA1011200"],"award-info":[{"award-number":["2023YFA1011200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Hubei Province of China","award":["2024AFB573"],"award-info":[{"award-number":["2024AFB573"]}]},{"name":"Science and Technology on Communication Security Laboratory Foundation","award":["6142103012207"],"award-info":[{"award-number":["6142103012207"]}]},{"name":"Innovation Group Project of the Natural Science Foundation of Hubei Province of China","award":["2023AFA021"],"award-info":[{"award-number":["2023AFA021"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,13]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Differential-linear (DL) cryptanalysis divides the target cipher $E$ into three part, i.e. $E = E_{2} \\circ E_{m} \\circ E_{1}$. Existing DL distinguishers search frameworks typically begin by estimating the theoretical correlation of $E_{m}$, followed by an experimental evaluation to determine its precise value. However, the deviation between the actual correlation and the theoretical correlation often renders the distinguishers identified by the models invalid. In this paper, we propose a pre-pruning technique to reduce the frequency of invalid distinguishers and improve the existing Mixed-Integer Linear Programming (MILP)-based DL distinguishers search frameworks. Specifically, we first filter the output differences of $E_{d}$ according to the probability of one-round differential characteristics. Subsequently, we identify the high-correlation bits of the output mask of the middle part and designate the low-correlation bits as inactive mask bits in our MILP models for each selected difference. Our pre-pruning technique significantly reduces the number of low-correlation distinguishers in the model\u2019s solution pool, allowing our tool to identify more valid DL distinguishers from a larger pool of higher quality candidates under limited computing resources. As an application, we find $12$-round and nine-round DL distinguishers for GIFT-64 and LELBC, respectively, and improve the best-known $13$-round DL distinguisher of PRESENT by one round. To the best of our knowledge, our nine-round DL distinguisher is the best distinguisher for LELBC in the single-key scenario.<\/jats:p>","DOI":"10.1093\/comjnl\/bxaf073","type":"journal-article","created":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T07:41:24Z","timestamp":1746690084000},"page":"1772-1784","source":"Crossref","is-referenced-by-count":1,"title":["MILP-based automatic search algorithms for differential-linear distinguishers"],"prefix":"10.1093","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0050-3250","authenticated-orcid":false,"given":"Yong","family":"Liu","sequence":"first","affiliation":[{"name":"Faculty of Mathematics and Statistics , Hubei Key Laboratory of Applied Mathematics, Hubei University, No. 368 Youyi Avenue, Wuchang District, Wuhan, Hubei Province, 430062,","place":["China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5149-5133","authenticated-orcid":false,"given":"Zejun","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology , Hubei University, No. 368 Youyi Avenue, Wuchang District, Wuhan, Hubei Province, 430062,","place":["China"]},{"name":"Key Laboratory of Intelligent Sensing System and Security (Hubei University) , Ministry of Education, No. 368 Youyi Avenue, Wuchang District, Wuhan, Hubei Province, 430062,","place":["China"]},{"name":"Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security , No. 368 Youyi Avenue, Wuchang District, Wuhan, Hubei Province, 430062,","place":["China"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8531-6517","authenticated-orcid":false,"given":"Shasha","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology , Hubei University, No. 368 Youyi Avenue, Wuchang District, Wuhan, Hubei Province, 430062,","place":["China"]},{"name":"Key Laboratory of Intelligent Sensing System and Security (Hubei University) , Ministry of Education, No. 368 Youyi Avenue, Wuchang District, Wuhan, Hubei Province, 430062,","place":["China"]},{"name":"Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security , No. 368 Youyi Avenue, Wuchang District, Wuhan, Hubei Province, 430062,","place":["China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8351-8766","authenticated-orcid":false,"given":"Xiangyong","family":"Zeng","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics and Statistics , Hubei Key Laboratory of Applied Mathematics, Hubei University, No. 368 Youyi Avenue, Wuchang District, Wuhan, Hubei Province, 430062,","place":["China"]},{"name":"Key Laboratory of Intelligent Sensing System and Security (Hubei University) , Ministry of Education, No. 368 Youyi Avenue, Wuchang District, Wuhan, Hubei Province, 430062,","place":["China"]}]}],"member":"286","published-online":{"date-parts":[[2025,5,23]]},"reference":[{"key":"2025111901220779500_ref1","first-page":"175:1","article-title":"The SIMON and SPECK lightweight block ciphers","volume-title":"Proceedings of DAC 2015","author":"Beaulieu","year":"2015"},{"key":"2025111901220779500_ref2","first-page":"307","article-title":"The Simeck family of lightweight block ciphers","volume-title":"Proceedings of CHES 2015","author":"Yang","year":"2015"},{"key":"2025111901220779500_ref3","first-page":"450","article-title":"PRESENT: an ultra-lightweight block cipher","volume-title":"Proceedings of CHES 2007","author":"Bogdanov","year":"2007"},{"key":"2025111901220779500_ref4","first-page":"321","article-title":"GIFT: a small present\u2014towards reaching the limit of lightweight encryption","volume-title":"Proceedings of CHES 2017","author":"Banik","year":"2017"},{"key":"2025111901220779500_ref5","doi-asserted-by":"publisher","first-page":"101022","DOI":"10.1016\/j.iot.2023.101022","article-title":"LELBC: a low energy lightweight block cipher for smart agriculture","volume":"25","author":"Song","year":"2024","journal-title":"Internet Things"},{"key":"2025111901220779500_ref6","doi-asserted-by":"publisher","first-page":"21727","DOI":"10.1109\/JIOT.2024.3376527","article-title":"ECLBC: a lightweight block cipher with error detection and correction mechanisms","volume":"11","author":"Guo","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"2025111901220779500_ref7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","article-title":"Differential cryptan-alysis of des-like cryptosystems","volume":"4","author":"Biham","year":"1991","journal-title":"J Cryptol"},{"key":"2025111901220779500_ref8","first-page":"386","article-title":"Linear cryptanalysis method for DES cipher","volume-title":"Proceedings of EUROCRYPT 1993","author":"Matsui","year":"1994"},{"key":"2025111901220779500_ref9","first-page":"17","article-title":"Differential-linear cryptanalysis","volume-title":"Proceedings of CRYPTO 1994","author":"Langford","year":"1994"},{"key":"2025111901220779500_ref10","first-page":"156","article-title":"The boomerang attack","volume-title":"Proceedings of FSE 1999","author":"Wagner","year":"1999"},{"key":"2025111901220779500_ref11","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/3-540-36178-2_16","article-title":"Enhancing differential-linear cryptanalysis","volume-title":"Proceedings of ASIACRYPT 2002","author":"Biham","year":"2002"},{"key":"2025111901220779500_ref12","first-page":"683","article-title":"Boomerang connectivity table: a new cryptanalysis tool","volume-title":"Proceedings of EUROCRYPT 2018","author":"Cid","year":"2018"},{"key":"2025111901220779500_ref13","first-page":"313","article-title":"DLCT: a new tool for differential-linear cryptanalysis","volume-title":"Proceedings of EUROCRYPT 2019","author":"Bar-On","year":"2019"},{"key":"2025111901220779500_ref14","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-3-030-84252-9_9","article-title":"Differential-linear cryptanalysis from an algebraic perspective","volume-title":"Proceedings of CRYPTO 2021","author":"Liu","year":"2021"},{"key":"2025111901220779500_ref15","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/978-3-031-68385-5_6","article-title":"New approaches for estimating the bias of differential-linear distinguishers","volume-title":"Proceedings of CRYPTO 2024","author":"Peng","year":"2024"},{"key":"2025111901220779500_ref16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-021-09398-9","article-title":"Ascon v1.2: lightweight authenticated encryption and hashing","volume":"34","author":"Dobraunig","year":"2021","journal-title":"J Cryptol"},{"key":"2025111901220779500_ref17","first-page":"222","article-title":"Serpent: a new block cipher proposal","volume-title":"Proceedings of FSE 1998","author":"Biham","year":"1998"},{"key":"2025111901220779500_ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","article-title":"The Design of Rijndael: AES\u2014the advanced encryption standard","volume-title":"Information Security and Cryptography","author":"Daemen","year":"2002"},{"key":"2025111901220779500_ref19","first-page":"181","article-title":"The 128-bit blockcipher CLEFIA (extended abstract)","volume-title":"Proceedings of FSE 2007","author":"Shirai","year":"2007"},{"key":"2025111901220779500_ref20","first-page":"2020","author":"Zhang","year":"2020","journal-title":"KNOT: algorithm specifications and supporting document"},{"key":"2025111901220779500_ref21","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1093\/comjnl\/bxz076","article-title":"MILP-based related-key rectangle attack and its application to GIFT, Khudra","volume":"62","author":"Chen","year":"2019","journal-title":"MIBS Comput J"},{"key":"2025111901220779500_ref22","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1093\/comjnl\/bxac012","article-title":"Linear attacks on SNOW 3G and SNOW-V using automatic search","volume":"66","author":"Shi","year":"2023","journal-title":"Comput J"},{"key":"2025111901220779500_ref23","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1093\/comjnl\/bxac173","article-title":"A new approach of evaluating the security against differential and linear cryptanalysis and its applications to serpent, NOEKEON and ASCON","volume":"67","author":"Zhou","year":"2024","journal-title":"Comput J"},{"key":"2025111901220779500_ref24","doi-asserted-by":"publisher","first-page":"123735","DOI":"10.1109\/ACCESS.2020.3005504","article-title":"Continuous diffusion analysis","volume":"8","author":"Coutinho","year":"2020","journal-title":"IEEE Access"},{"key":"2025111901220779500_ref25","first-page":"252","article-title":"Fully automated differential-linear attacks against ARX ciphers","volume-title":"Proceedings of CT-RSA 2023","author":"Bellini","year":"2023"},{"key":"2025111901220779500_ref26","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-031-68385-5_2","article-title":"Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT","volume-title":"Proceedings of CRYPTO 2024","author":"Hadipour","year":"2024"},{"key":"2025111901220779500_ref27","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-662-53008-5_5","article-title":"The SKINNY family of block ciphers and its low-latency variant MANTIS","volume-title":"Proceedings of CRYPTO 2016","author":"Beierle","year":"2016"},{"key":"2025111901220779500_ref28","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-642-35999-6_22","article-title":"TWINE: a lightweight block cipher for multiple platforms","volume-title":"Proceedings of SAC 2012","author":"Suzaki","year":"2013"},{"key":"2025111901220779500_ref29","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-030-81652-0_21","article-title":"WARP: revisiting GFN for lightweight 128-bit block cipher","volume-title":"Proceedings of SAC 2020","author":"Banik","year":"2021"},{"key":"2025111901220779500_ref30","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","article-title":"LBlock: a lightweight block cipher","volume-title":"Proceedings of ACNS 2011","author":"Wu","year":"2011"},{"key":"2025111901220779500_ref31","doi-asserted-by":"publisher","DOI":"10.62056\/a6n5txol7","article-title":"Differential-linear cryptanalysis of GIFT family and GIFT-based ciphers","volume":"1","author":"Wang","year":"2024","journal-title":"IACR Commun Cryptol"},{"key":"2025111901220779500_ref32","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-981-99-8727-6_8","article-title":"Differential-linear approximation semi-unconstrained searching and partition tree: application to LEA and speck","volume-title":"Proceedings of ASIACRYPT 2023","author":"Chen","year":"2023"},{"key":"2025111901220779500_ref33","article-title":"Differential cryptanalysis of a lightweight block cipher LELBC","author":"Kaur","year":"2024"},{"key":"2025111901220779500_ref34","article-title":"Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined properties","author":"Sun","year":"2014"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/68\/11\/1772\/63300377\/bxaf073.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/68\/11\/1772\/63300377\/bxaf073.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:22:15Z","timestamp":1763533335000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/68\/11\/1772\/8141123"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,23]]},"references-count":34,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,5,23]]},"published-print":{"date-parts":[[2025,11,13]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxaf073","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025,11]]},"published":{"date-parts":[[2025,5,23]]}}}