{"id":"https://openalex.org/W7125409740","doi":"https://doi.org/10.1186/s42400-025-00402-4","title":"Cakr: a collision-aware cryptanalysis scheme for lightweight block ciphers","display_name":"Cakr: a collision-aware cryptanalysis scheme for lightweight block ciphers","publication_year":2026,"publication_date":"2026-01-22","ids":{"openalex":"https://openalex.org/W7125409740","doi":"https://doi.org/10.1186/s42400-025-00402-4"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00402-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00402-4","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00402-4.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00402-4.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123592704","display_name":"Siqi Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I149735164","display_name":"Hengyang Normal University","ror":"https://ror.org/006bvjm48","country_code":"CN","type":"education","lineage":["https://openalex.org/I149735164"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siqi Zhu","raw_affiliation_strings":["Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang Normal University, Hengyang, 421002, China"],"affiliations":[{"raw_affiliation_string":"Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang Normal University, Hengyang, 421002, China","institution_ids":["https://openalex.org/I149735164"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027193160","display_name":"L. Li","orcid":null},"institutions":[{"id":"https://openalex.org/I149735164","display_name":"Hengyang Normal University","ror":"https://ror.org/006bvjm48","country_code":"CN","type":"education","lineage":["https://openalex.org/I149735164"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lang Li","raw_affiliation_strings":["College of Computer Science and Technology, Hengyang Normal University, 421002, Hengyang, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Hengyang Normal University, 421002, Hengyang, China","institution_ids":["https://openalex.org/I149735164"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123628485","display_name":"Ruihan Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I149735164","display_name":"Hengyang Normal University","ror":"https://ror.org/006bvjm48","country_code":"CN","type":"education","lineage":["https://openalex.org/I149735164"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruihan Xu","raw_affiliation_strings":["Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang Normal University, Hengyang, 421002, China"],"affiliations":[{"raw_affiliation_string":"Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang Normal University, Hengyang, 421002, China","institution_ids":["https://openalex.org/I149735164"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123623415","display_name":"Zhiwen Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I149735164","display_name":"Hengyang Normal University","ror":"https://ror.org/006bvjm48","country_code":"CN","type":"education","lineage":["https://openalex.org/I149735164"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiwen Hu","raw_affiliation_strings":["Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang Normal University, Hengyang, 421002, China"],"affiliations":[{"raw_affiliation_string":"Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang Normal University, Hengyang, 421002, China","institution_ids":["https://openalex.org/I149735164"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008561670","display_name":"Yemao Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I149735164","display_name":"Hengyang Normal University","ror":"https://ror.org/006bvjm48","country_code":"CN","type":"education","lineage":["https://openalex.org/I149735164"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yemao Hu","raw_affiliation_strings":["Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang Normal University, Hengyang, 421002, China"],"affiliations":[{"raw_affiliation_string":"Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang Normal University, Hengyang, 421002, China","institution_ids":["https://openalex.org/I149735164"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5027193160"],"corresponding_institution_ids":["https://openalex.org/I149735164"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14882523,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.7804999947547913,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.7804999947547913,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.11540000140666962,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.02630000002682209,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7444999814033508},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.61080002784729},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5623999834060669},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5299999713897705},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45980000495910645},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.43939998745918274},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.4124999940395355},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4101000130176544},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.38019999861717224}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7444999814033508},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7275000214576721},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.61080002784729},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5623999834060669},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5299999713897705},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4869000017642975},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45980000495910645},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.43939998745918274},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.4124999940395355},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4101000130176544},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.38019999861717224},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.3598000109195709},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.35920000076293945},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35690000653266907},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.35569998621940613},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.3393000066280365},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.33219999074935913},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.32659998536109924},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.2924000024795532},{"id":"https://openalex.org/C3017489831","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Running time","level":2,"score":0.2770000100135803},{"id":"https://openalex.org/C150807984","wikidata":"https://www.wikidata.org/wiki/Q1992074","display_name":"Bit array","level":3,"score":0.2736999988555908},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2685999870300293},{"id":"https://openalex.org/C2781011336","wikidata":"https://www.wikidata.org/wiki/Q1465133","display_name":"Time limit","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.26190000772476196},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.26080000400543213}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00402-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00402-4","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00402-4.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:65a2072ca37047f396f599a3677ad631","is_oa":true,"landing_page_url":"https://doaj.org/article/65a2072ca37047f396f599a3677ad631","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-16 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00402-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00402-4","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00402-4.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.6164950132369995}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6100681348","display_name":null,"funder_award_id":"2022JJ30103","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G7377800458","display_name":null,"funder_award_id":"2016TP1020","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125409740.pdf","grobid_xml":"https://content.openalex.org/works/W7125409740.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W1427832936","https://openalex.org/W2036919546","https://openalex.org/W2969001071","https://openalex.org/W2981623187","https://openalex.org/W3036586801","https://openalex.org/W3128639134","https://openalex.org/W3159555774","https://openalex.org/W3200955720","https://openalex.org/W4220728404","https://openalex.org/W4224245290","https://openalex.org/W4226072722","https://openalex.org/W4286203490","https://openalex.org/W4317806007","https://openalex.org/W4317928249","https://openalex.org/W4380083563","https://openalex.org/W4388399916","https://openalex.org/W4388624781","https://openalex.org/W4389272061"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Partial":[1],"neural":[2,12,108,175],"distinguishers":[3,109],"limit":[4],"the":[5,15,20,45,48,53,59,71,98,104,122,126,136,157,160,168,174,183],"available":[6],"ciphertext":[7,161],"bit":[8,144],"combinations":[9,194],"in":[10,195],"differential":[11,152],"cryptanalysis.":[13],"When":[14],"training":[16,107],"data":[17,54,90],"size":[18],"and":[19,52,69,110,115,133,139,155],"number":[21,49],"of":[22,50,73,101,159],"bits":[23,51],"are":[24,177],"not":[25],"appropriately":[26],"selected,":[27],"label":[28],"collisions":[29,68,75],"can":[30],"occur,":[31],"which":[32],"adversely":[33],"affects":[34],"key":[35,127],"recovery":[36,128],"efficiency.":[37],"This":[38,95],"paper":[39],"conducts":[40],"an":[41],"analysis":[42],"to":[43,57,66,173,189],"investigate":[44],"correlation":[46],"between":[47],"size,":[55],"aiming":[56],"address":[58],"aforementioned":[60],"issue.":[61],"It":[62],"develops":[63],"a":[64,143,151,202],"strategy":[65,154],"control":[67],"mitigate":[70],"impact":[72],"these":[74],"on":[76,92],"model":[77],"performance.":[78],"A":[79],"Collision-Aware":[80],"Key":[81],"Recovery":[82],"(CAKR)":[83],"framework":[84,96,124,199],"is":[85,147],"proposed":[86,148],"tailored":[87],"for":[88,106,135,192],"high-collision":[89],"based":[91],"this":[93],"strategy.":[94],"leverages":[97],"distribution":[99,163],"characteristics":[100],"labels,":[102],"eliminating":[103],"need":[105],"significantly":[111],"reducing":[112,182],"both":[113],"time":[114,129,185,209],"resource":[116],"consumption.":[117],"Experimental":[118],"results":[119],"show":[120],"that":[121,149,205],"CAKR":[123,198],"reduces":[125,208],"by":[130,179],"96.8%,":[131],"95.5%,":[132],"91.0%":[134],"Speck32/64,":[137],"Speck64/96,":[138],"Speck96/128,":[140],"respectively.":[141],"Additionally,":[142],"search":[145,184],"algorithm":[146],"incorporates":[150],"evolution":[153],"uses":[156],"non-uniformity":[158],"difference":[162],"among":[164],"positive":[165],"samples":[166],"as":[167],"fitness":[169],"criterion.":[170],"Frequent":[171],"calls":[172],"distinguisher":[176],"avoided":[178],"our":[180],"method,":[181],"from":[186],"3.286":[187],"h":[188],"7.464":[190],"s":[191],"8-bit":[193],"Speck32/64.":[196],"The":[197],"also":[200],"offers":[201],"quantum":[203],"version":[204],"theoretically":[206],"further":[207],"complexity.":[210]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2026-01-23T00:00:00"}
