{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:10:17Z","timestamp":1756271417385,"version":"3.44.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130149","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"936-943","source":"Crossref","is-referenced-by-count":0,"title":["Neural Cryptanalysis of Lightweight Block Ciphers Using Residual MLPs"],"prefix":"10.1109","author":[{"given":"Charis","family":"Eleftheriadis","sequence":"first","affiliation":[{"name":"Sidroco Holdings Ltd,Nicosia,Cyprus"}]},{"given":"Georgios","family":"Andronikidis","sequence":"additional","affiliation":[{"name":"Sidroco Holdings Ltd,Nicosia,Cyprus"}]},{"given":"Anastasios","family":"Lytos","sequence":"additional","affiliation":[{"name":"Sidroco Holdings Ltd,Nicosia,Cyprus"}]},{"given":"Eleutherios","family":"Fountoukidis","sequence":"additional","affiliation":[{"name":"Sidroco Holdings Ltd,Nicosia,Cyprus"}]},{"given":"Paris-Alexandros","family":"Karypidis","sequence":"additional","affiliation":[{"name":"Sidroco Holdings Ltd,Nicosia,Cyprus"}]},{"given":"Thomas","family":"Lagkas","sequence":"additional","affiliation":[{"name":"Democritus University of Thrace,Department of Informatics,Kavala,Greece"}]},{"given":"Vasileios","family":"Argyriou","sequence":"additional","affiliation":[{"name":"Kingston Univerity London,Dpt. of Networks &#x0026; Digital Media,Surrey,UK"}]},{"given":"Ioannis","family":"Nanos","sequence":"additional","affiliation":[{"name":"International Hellenic University,Dpt. of Organisation Management, Marketing &#x0026; Tourism,Thessaloniki,Greece"}]},{"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia,Dpt. of Electrical &#x0026; Computer Engineering,Kozani,Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"102663","DOI":"10.1016\/j.jnca.2020.102663","article-title":"A-z survey of internet of things: Architectures, protocols, applications, recent advances, future directions and recommendations","volume":"163","author":"Kassab","year":"2020","journal-title":"Journal of Network and Computer Applications"},{"issue":"11","key":"ref2","doi-asserted-by":"crossref","DOI":"10.3390\/s23115206","article-title":"Integration of iot-enabled technologies and artificial intelligence (ai) for smart city scenario: Recent advancements and future trends","volume":"23","author":"Alahi","year":"2023","journal-title":"Sensors"},{"issue":"8","key":"ref3","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12081901","article-title":"Security and internet of things: Benefits, challenges, and future perspectives","volume":"12","author":"Taherdoost","year":"2023","journal-title":"Electronics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3052867"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747946"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-1-4613-9314-6_6","author":"Biham","year":"1993","journal-title":"Differential Cryptanalysis of FEAL"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSC47296.2019.8937659"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE.2014.7086640"},{"key":"ref10","first-page":"11","article-title":"Advanced encryption standard (aes)","volume":"00","author":"Dworkin","year":"2001"},{"issue":"2","key":"ref11","first-page":"256","article-title":"Symmetric encryption algorithms: Review and evaluation study","volume":"12","author":"Alenezi","year":"2020","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45537-X_1"},{"issue":"3","key":"ref13","doi-asserted-by":"crossref","first-page":"257","DOI":"10.62411\/jcta.9851","article-title":"Machine learning and cryptanalysis: An in-depth exploration of current practices and future potential","volume":"1","author":"Singh","year":"2024","journal-title":"Journal of Computing Theories and Applications"},{"article-title":"Recent advances of neural attacks against block ciphers","volume-title":"Proc. of SCIS","author":"Baek","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6868506"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/3701067"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"109622","DOI":"10.1016\/j.comnet.2023.109622","article-title":"An efficient differential analysis method based on deep learning","volume":"224","author":"Huang","year":"2023","journal-title":"Computer Networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25286-0_1"},{"key":"ref20","article-title":"Fast and accurate deep network learning by exponential linear units (elus)","author":"Clevert","year":"2015","journal-title":"arXiv preprint arXiv:1511.07289"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_28"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119691884799"},{"issue":"7","key":"ref23","doi-asserted-by":"crossref","DOI":"10.3390\/e25070986","article-title":"Deep-learning-based cryptanalysis of lightweight block ciphers revisited","volume":"25","author":"Kim","year":"2023","journal-title":"Entropy"},{"issue":"13","key":"ref24","doi-asserted-by":"crossref","DOI":"10.3390\/math12131936","article-title":"Comprehensive neural cryptanalysis on block ciphers using different encryption methods","volume":"12","author":"Jeong","year":"2024","journal-title":"Mathematics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3067036"},{"key":"ref26","first-page":"149","article-title":"The Backpropagation Algorithm. Berlin, Heidelberg","author":"Rojas","year":"1996"},{"key":"ref27","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint arXiv:1412.6980"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0573-15"},{"key":"ref29","article-title":"Supervised autoencoders: Improving generalization performance with unsupervised regularizers","volume-title":"Advances in Neural Information Processing Systems","volume":"31","author":"Le"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MetroInd4.0IoT61288.2024.10584217"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2024.3372605"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81652-0_22"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-024-01519-1"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130149.pdf?arnumber=11130149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T04:52:53Z","timestamp":1756270373000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130149\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130149","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}