{"id":"https://openalex.org/W4409018044","doi":"https://doi.org/10.1186/s42400-024-00327-4","title":"Improved machine learning-aided linear cryptanalysis: application to DES","display_name":"Improved machine learning-aided linear cryptanalysis: application to DES","publication_year":2025,"publication_date":"2025-04-01","ids":{"openalex":"https://openalex.org/W4409018044","doi":"https://doi.org/10.1186/s42400-024-00327-4"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00327-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00327-4","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00327-4","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00327-4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074934584","display_name":"Zezhou Hou","orcid":"https://orcid.org/0000-0002-7764-9663"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zezhou Hou","raw_affiliation_strings":["Information Engineering University, 450000, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University, 450000, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006702523","display_name":"Jiongjiong Ren","orcid":"https://orcid.org/0000-0003-2223-4329"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiongjiong Ren","raw_affiliation_strings":["Information Engineering University, 450000, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University, 450000, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059702202","display_name":"Shaozhen Chen","orcid":"https://orcid.org/0000-0003-1015-8875"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaozhen Chen","raw_affiliation_strings":["Information Engineering University, 450000, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University, 450000, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074934584"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":5.3159,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.94655116,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6368563175201416},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6270963549613953},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.442526638507843},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43502095341682434},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35040944814682007},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24766069650650024},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15314969420433044}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6368563175201416},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6270963549613953},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.442526638507843},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43502095341682434},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35040944814682007},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24766069650650024},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15314969420433044}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00327-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00327-4","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00327-4","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9a6980b600414b13be996e7084cd4614","is_oa":true,"landing_page_url":"https://doaj.org/article/9a6980b600414b13be996e7084cd4614","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-16 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00327-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00327-4","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00327-4","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8234322185","display_name":null,"funder_award_id":"62206312","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4409018044.pdf"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1519447501","https://openalex.org/W1542500920","https://openalex.org/W1556727271","https://openalex.org/W1564295073","https://openalex.org/W1964723977","https://openalex.org/W2057524374","https://openalex.org/W2088359425","https://openalex.org/W2135759164","https://openalex.org/W2194775991","https://openalex.org/W2613512413","https://openalex.org/W2752782242","https://openalex.org/W2903143476","https://openalex.org/W2963446712","https://openalex.org/W2969001071","https://openalex.org/W2997851848","https://openalex.org/W3086407044","https://openalex.org/W3159555774","https://openalex.org/W4317928249"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4387369504","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347"],"abstract_inverted_index":{"Abstract":[0],"In":[1,63],"CRYPTO":[2],"2019,":[3],"Gohr":[4],"built":[5],"a":[6,82,109],"bridge":[7],"between":[8],"machine":[9,17,38,57,70,83,111,155,182],"learning":[10,58],"and":[11,48,74,91,100,123,141,165],"differential":[12,24],"cryptanalysis,":[13,29,158],"which":[14,116],"show":[15],"that":[16,37,181],"learning-aided":[18,39,71,84,112,156,183],"methods":[19],"have":[20],"advantages":[21],"over":[22],"classical":[23,194],"cryptanalysis.":[25,62],"Yet,":[26],"for":[27],"linear":[28,61,72,113,157],"there":[30],"is":[31],"lack":[32,50],"of":[33,45,51,95],"effective":[34,53],"works":[35,153],"showing":[36],"cryptanalysis":[40,73,114,184],"can":[41,117,185],"reach":[42],"the":[43,93,96,105,151,159,162,166,178,187],"benchmark":[44],"traditional":[46],"counterparts":[47],"also":[49],"an":[52],"universal":[54],"framework":[55],"using":[56],"to":[59,76,86,120],"assist":[60],"this":[64],"paper,":[65],"we":[66,80,107,130],"mainly":[67],"focus":[68],"on":[69,104,135,145],"application":[75],"Des":[77,140,147],".":[78,148],"First,":[79],"propose":[81,108],"model":[85,97],"distinguish":[87],"different":[88],"Bernoulli":[89],"distributions":[90],"demonstrate":[92],"validity":[94],"through":[98],"experiments":[99],"theoretical":[101],"analysis.":[102],"Based":[103],"model,":[106],"new":[110],"framework,":[115],"be":[118],"applied":[119],"one":[121,132],"bit":[122,133],"multiple":[124,142],"bits":[125,143],"key-recovery":[126],"attacks.":[127],"As":[128],"applications,":[129],"perform":[131],"attacks":[134],"3-,":[136],"4-,":[137],"5-,":[138],"6-round":[139],"attack":[144],"8-round":[146],"Compared":[149],"with":[150],"previous":[152],"about":[154],"results":[160],"improve":[161],"success":[163],"rate":[164],"complexity.":[167],"Most":[168],"importantly,":[169],"more":[170],"rounds":[171],"are":[172],"covered":[173],"in":[174],"our":[175],"work.":[176],"Besides,":[177],"work":[179],"indicates":[180],"achieve":[186],"same":[188],"or":[189],"marginally":[190],"better":[191],"performance":[192],"than":[193],"methods.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
