{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T16:34:38Z","timestamp":1745858078568},"reference-count":21,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2024,8,1]]},"DOI":"10.1587\/transinf.2024edp7011","type":"journal-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T22:19:18Z","timestamp":1722464358000},"page":"1016-1028","source":"Crossref","is-referenced-by-count":3,"title":["Investigating and Enhancing the Neural Distinguisher for Differential Cryptanalysis"],"prefix":"10.1587","volume":"E107.D","author":[{"given":"Gao","family":"WANG","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"}]},{"given":"Gaoli","family":"WANG","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"},{"name":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province"}]},{"given":"Siwei","family":"SUN","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Chinese Academy of Sciences"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] A. Gohr, \u201cImproving attacks on round-reduced speck32\/64 using deep learning,\u201d Annual Int. Cryptology Conf., pp.150-179, Springer, 2019. 10.1007\/978-3-030-26951-7_6","DOI":"10.1007\/978-3-030-26951-7_6"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] B. Hou, Y. Li, H. Zhao, and B. Wu, \u201cLinear attack on round-reduced des using deep learning,\u201d Computer Security-ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II 25, pp.131-145, Springer, 2020. 10.1007\/978-3-030-59013-0_7","DOI":"10.1007\/978-3-030-59013-0_7"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] B. Zahednejad and L. Lyu, \u201cAn improved integral distinguisher scheme based on neural networks,\u201d Int. J. Intelligent Systems, vol.37, no.10, pp.7584-7613, 2022. 10.1002\/int.22895","DOI":"10.1002\/int.22895"},{"key":"4","unstructured":"[4] L. Lerman, G. Bontempi, and O. Markowitch, \u201cSide channel attack: an approach based on machine learning,\u201d Center for Advanced Security Research Darmstadt, vol.29, 2011."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] A. Benamira, D. Gerault, T. Peyrin, and Q.Q. Tan, \u201cA deeper look at machine learning-based cryptanalysis,\u201d Annual Int. Conf. Theory and Applications of Cryptographic Techniques, pp.805-835, Springer, 2021. 10.1007\/978-3-030-77870-5_28","DOI":"10.1007\/978-3-030-77870-5_28"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] J.-H. Lee, M. Heo, K.-R. Kim, and C.-S. Kim, \u201cSingle-image depth estimation based on fourier domain analysis,\u201d Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp.330-339, 2018.","DOI":"10.1109\/CVPR.2018.00042"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] C. Schuldt, I. Laptev, and B. Caputo, \u201cRecognizing human actions: a local svm approach,\u201d Proc. 17th Int. Conf. Pattern Recognition, 2004. ICPR 2004., pp.32-36, IEEE, 2004. 10.1109\/icpr.2004.1334462","DOI":"10.1109\/ICPR.2004.1334462"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] Y. Chen, Y. Shen, H. Yu, and S. Yuan, \u201cA new neural distinguisher considering features derived from multiple ciphertext pairs,\u201d The Computer J., vol.66, no.6, pp.1419-1433, 2023. 10.1093\/comjnl\/bxac019","DOI":"10.1093\/comjnl\/bxac019"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] Z.Z. Hou, J.J. Ren, and S.Z. Chen, \u201cImprove neural distinguishers of simon and speck,\u201d Security and Communication Networks, vol.2021, pp.1-11, 2021. 10.1155\/2021\/9288229","DOI":"10.1155\/2021\/9288229"},{"key":"10","unstructured":"[10] L. Zhang, Z. Wang, J. Guo, et al., \u201cImproving differential-neural cryptanalysis with inception,\u201d Cryptology ePrint Archive, 2022."},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] J.S. Liu, J.J. Ren, S.Z. Chen, and M.M. Li, \u201cImproved neural distinguishers with multi-round and multi-splicing construction,\u201d J. Information Security and Applications, vol.74, p.103461, 2023. 10.1016\/j.jisa.2023.103461","DOI":"10.1016\/j.jisa.2023.103461"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers, \u201cThe simon and speck lightweight block ciphers,\u201d Proc. 52nd annual design automation conference, pp.1-6, 2015. 10.1145\/2744769.2747946","DOI":"10.1145\/2744769.2747946"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] E. Biham and A. Shamir, \u201cDifferential cryptanalysis of des-like cryptosystems,\u201d J. CRYPTOLOGY, vol.4, no.1, pp.3-72, 1991. 10.1007\/bf00630563","DOI":"10.1007\/BF00630563"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] K. Fu, M. Wang, Y. Guo, S. Sun, and L. Hu, \u201cMilp-based automatic search algorithms for differential and linear trails for speck,\u201d Int. Conf. Fast Software Encryption, pp.268-288, Springer, 2016. 10.1007\/978-3-662-52993-5_14","DOI":"10.1007\/978-3-662-52993-5_14"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] S. Sun, L. Hu, P. Wang, K. Qiao, X. Ma, and L. Song, \u201cAutomatic security evaluation and (related-key) differential characteristic search: application to simon, present, lblock, des and other bit-oriented block ciphers,\u201d Int. Conf. Theory and Application of Cryptology and Information Security, pp.158-178, Springer, 2014. 10.1007\/978-3-662-45611-8_9","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] C. Blondeau and B. G\u00e9rard, \u201cMultiple differential cryptanalysis: theory and practice.,\u201d FSE, pp.35-54, Springer, 2011. 10.1007\/978-3-642-21702-9_3","DOI":"10.1007\/978-3-642-21702-9_3"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] T. Yadav and M. Kumar, \u201cDifferential-ml distinguisher: Machine learning based generic extension for differential cryptanalysis,\u201d Int. Conf. Cryptology and Information Security in Latin America, pp.191-212, Springer, 2021. 10.1007\/978-3-030-88238-9_10","DOI":"10.1007\/978-3-030-88238-9_10"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] R.M. Aziz, M.F. Baluch, S. Patel, and A.H. Ganie, \u201cLgbm: a machine learning approach for ethereum fraud detection,\u201d Int. J. Information Technology, vol.14, no.7, pp.3321-3331, 2022. 10.1007\/s41870-022-00864-6","DOI":"10.1007\/s41870-022-00864-6"},{"key":"19","unstructured":"[19] A. Fisher, C. Rudin, and F. Dominici, \u201cAll models are wrong, but many are useful: Learning a variable&apos;s importance by studying an entire class of prediction models simultaneously,\u201d J. Mach. Learn. Res., vol.20, no.177, pp.1-81, 2019."},{"key":"20","unstructured":"[20] A. Gohr, G. Leander, and P. Neumann, \u201cAn assessment of differential-neural distinguishers,\u201d Cryptology ePrint Archive, 2022."},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] A. Baksi, \u201cMachine learning-assisted differential distinguishers for lightweight ciphers,\u201d in Classical and Physical Security of Symmetric Key Cryptographic Algorithms, pp.141-162, Springer, 2022. 10.1007\/978-981-16-6522-6_6","DOI":"10.1007\/978-981-16-6522-6_6"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E107.D\/8\/E107.D_2024EDP7011\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T04:21:22Z","timestamp":1722658882000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E107.D\/8\/E107.D_2024EDP7011\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,1]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2024edp7011","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"type":"print","value":"0916-8532"},{"type":"electronic","value":"1745-1361"}],"subject":[],"published":{"date-parts":[[2024,8,1]]},"article-number":"2024EDP7011"}}