{"id":"https://openalex.org/W4409991437","doi":"https://doi.org/10.1109/jiot.2025.3566051","title":"Enhanced Neural Distinguisher Model for Efficient Differential Cryptanalysis","display_name":"Enhanced Neural Distinguisher Model for Efficient Differential Cryptanalysis","publication_year":2025,"publication_date":"2025-05-01","ids":{"openalex":"https://openalex.org/W4409991437","doi":"https://doi.org/10.1109/jiot.2025.3566051"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3566051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3566051","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101319131","display_name":"Yongcan Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yongcan Lu","raw_affiliation_strings":["School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin, Guangxi Province, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin, Guangxi Province, P.R. China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085571266","display_name":"Ying Guo","orcid":"https://orcid.org/0000-0002-5330-656X"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Guo","raw_affiliation_strings":["School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin, Guangxi Province, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin, Guangxi Province, P.R. China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091311315","display_name":"Wenfen Liu","orcid":"https://orcid.org/0000-0001-5601-8347"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenfen Liu","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi Province, P.R. China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi Province, P.R. China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114488701","display_name":"Wen Chen","orcid":"https://orcid.org/0000-0002-6630-5793"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wen Chen","raw_affiliation_strings":["School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin, Guangxi Province, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin, Guangxi Province, P.R. China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058534477","display_name":"Qingwen Yan","orcid":"https://orcid.org/0009-0004-9354-4927"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingwen Yan","raw_affiliation_strings":["School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin, Guangxi Province, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin, Guangxi Province, P.R. China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067057037","display_name":"Bin Yu","orcid":"https://orcid.org/0000-0002-3128-7441"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Yu","raw_affiliation_strings":["School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin, Guangxi Province, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University Of Electronic Technology, Guilin, Guangxi Province, P.R. China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101319131"],"corresponding_institution_ids":["https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":2.5568,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.89059088,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"12","issue":"14","first_page":"28431","last_page":"28444"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7952584028244019},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.557033360004425},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.5257837772369385},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4822414815425873},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.44766613841056824},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43409720063209534},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.39868879318237305}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7952584028244019},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.557033360004425},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.5257837772369385},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4822414815425873},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.44766613841056824},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43409720063209534},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39868879318237305}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3566051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3566051","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1427832936","https://openalex.org/W1883151075","https://openalex.org/W1894646615","https://openalex.org/W2083898372","https://openalex.org/W2087928947","https://openalex.org/W2135759164","https://openalex.org/W2166473670","https://openalex.org/W2330421065","https://openalex.org/W2495518322","https://openalex.org/W2504919933","https://openalex.org/W2901194168","https://openalex.org/W2969001071","https://openalex.org/W3034552520","https://openalex.org/W3155294049","https://openalex.org/W3159555774","https://openalex.org/W4226072722","https://openalex.org/W4226495901","https://openalex.org/W4251361495","https://openalex.org/W4389272061","https://openalex.org/W4403175122","https://openalex.org/W6782028575","https://openalex.org/W6797038157","https://openalex.org/W6802407643","https://openalex.org/W6802421668","https://openalex.org/W6802795133","https://openalex.org/W6810151889","https://openalex.org/W6810540097","https://openalex.org/W6993021238"],"related_works":["https://openalex.org/W57168481","https://openalex.org/W4230315357","https://openalex.org/W2560473362","https://openalex.org/W2509111091","https://openalex.org/W2003194200","https://openalex.org/W1990201054","https://openalex.org/W1539170589","https://openalex.org/W1410349837","https://openalex.org/W2949235530","https://openalex.org/W2950215720"],"abstract_inverted_index":{"At":[0],"CRYPTO":[1],"2019,":[2],"Gohr":[3],"applied":[4],"deep":[5],"learning":[6],"to":[7,91,108,173],"differential":[8,19,65,199],"cryptanalysis":[9],"of":[10,17,35,64,114,123,133,166,177,191,198,213,237],"SPECK32/64,":[11],"achieving":[12],"identification":[13,156],"accuracy":[14,48,71,157,235],"surpassing":[15],"that":[16,68,209],"traditional":[18],"distinguishers.":[20],"This":[21,104],"achievement":[22],"offers":[23],"new":[24],"perspectives":[25],"for":[26,230],"data":[27,79,139,149],"security":[28],"and":[29,49,96,129,158,194],"privacy":[30],"protection":[31],"in":[32],"the":[33,87,101,106,111,120,130,147,154,164,175,188,195,211,214],"Internet":[34],"Things":[36],"(IoT).":[37],"However,":[38],"existing":[39],"research":[40],"still":[41],"faces":[42],"challenges":[43],"such":[44],"as":[45,220],"limited":[46],"model":[47,63,107],"excessive":[50],"computational":[51,74,184],"resource":[52],"consumption.":[53],"To":[54],"address":[55],"these":[56],"issues,":[57],"we":[58,162,201,223],"propose":[59],"a":[60,203,226],"novel":[61],"enhanced":[62],"neural":[66],"distinguishers":[67],"balances":[69],"high":[70],"with":[72,233],"low":[73],"overhead.":[75],"Initially,":[76],"an":[77,136,167,221,234],"innovative":[78],"feature":[80],"extraction":[81],"strategy":[82,142],"is":[83,143],"designed":[84],"by":[85],"introducing":[86],"skip":[88],"connection":[89],"mechanism":[90],"effectively":[92,182],"integrate":[93],"both":[94],"linear":[95,134],"non-linear":[97,124],"features":[98],"extracted":[99],"from":[100],"raw":[102],"data.":[103],"allows":[105],"better":[109],"approximate":[110],"internal":[112],"mechanisms":[113],"cryptographic":[115,192],"algorithms.":[116],"Subsequently,":[117],"based":[118],"on":[119],"positional":[121],"relationships":[122],"components":[125],"within":[126],"round":[127],"functions":[128],"diffusion":[131],"properties":[132],"components,":[135],"original":[137],"input":[138],"format":[140],"selection":[141],"proposed.":[144],"We":[145],"employ":[146],"multi-pair":[148],"augmentation":[150],"strategy,":[151],"significantly":[152],"improving":[153],"model\u2019s":[155],"generalization":[159],"capabilities.":[160],"Additionally,":[161],"pioneer":[163],"integration":[165],"Efficient":[168],"Channel":[169],"Attention":[170],"(ECA)":[171],"module,":[172],"curtail":[174],"number":[176],"residual":[178],"blocks":[179],"required,":[180],"thereby":[181],"reducing":[183],"load.":[185],"Furthermore,":[186],"leveraging":[187],"algebraic":[189],"expressions":[190],"ciphers":[193],"propagation":[196],"characteristics":[197],"features,":[200],"develop":[202],"fast":[204],"neutral":[205],"bit":[206],"search":[207],"algorithm":[208],"enhances":[210],"efficiency":[212],"key":[215,227],"recovery":[216,228],"process.":[217],"Taking":[218],"SIMON32/64":[219],"example,":[222],"successfully":[224],"demonstrate":[225],"attack":[229],"16":[231],"rounds":[232],"rate":[236],"80%.":[238]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
