{"id":"https://openalex.org/W4401161206","doi":"https://doi.org/10.1587/transinf.2024edp7011","title":"Investigating and Enhancing the Neural Distinguisher for Differential Cryptanalysis","display_name":"Investigating and Enhancing the Neural Distinguisher for Differential Cryptanalysis","publication_year":2024,"publication_date":"2024-07-31","ids":{"openalex":"https://openalex.org/W4401161206","doi":"https://doi.org/10.1587/transinf.2024edp7011"},"language":"en","primary_location":{"id":"doi:10.1587/transinf.2024edp7011","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2024edp7011","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E107.D/8/E107.D_2024EDP7011/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E107.D/8/E107.D_2024EDP7011/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101770779","display_name":"Wang Gao","orcid":"https://orcid.org/0000-0003-1872-8991"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gao WANG","raw_affiliation_strings":["Advanced Cryptography and System Security Key Laboratory of Sichuan Province","Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"],"affiliations":[{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068633811","display_name":"Gaoli Wang","orcid":"https://orcid.org/0000-0002-2121-9306"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaoli WANG","raw_affiliation_strings":["Advanced Cryptography and System Security Key Laboratory of Sichuan Province","Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University"],"affiliations":[{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027649882","display_name":"Siwei Sun","orcid":"https://orcid.org/0000-0002-3058-2377"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siwei SUN","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101770779"],"corresponding_institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I4210139618","https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":1.0878,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80781927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"E107.D","issue":"8","first_page":"1016","last_page":"1028"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9643999934196472,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8909131288528442},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.7123157978057861},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6005955934524536},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.558210551738739},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.492135226726532},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4497244358062744},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.4092350900173187},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.40101712942123413},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.34316396713256836},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3352190852165222},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2293923795223236},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20224076509475708},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1303303837776184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08370482921600342}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8909131288528442},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.7123157978057861},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6005955934524536},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.558210551738739},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.492135226726532},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4497244358062744},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.4092350900173187},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.40101712942123413},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.34316396713256836},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3352190852165222},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2293923795223236},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20224076509475708},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1303303837776184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08370482921600342},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transinf.2024edp7011","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2024edp7011","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E107.D/8/E107.D_2024EDP7011/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transinf.2024edp7011","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2024edp7011","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E107.D/8/E107.D_2024EDP7011/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4401161206.pdf"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W197228877","https://openalex.org/W1629301835","https://openalex.org/W1846045953","https://openalex.org/W2087928947","https://openalex.org/W2157568256","https://openalex.org/W2495518322","https://openalex.org/W2798727000","https://openalex.org/W2969001071","https://openalex.org/W3086407044","https://openalex.org/W3159555774","https://openalex.org/W3208405702","https://openalex.org/W4205688174","https://openalex.org/W4210648800","https://openalex.org/W4226072722","https://openalex.org/W4226495901","https://openalex.org/W4229373926","https://openalex.org/W4249279051","https://openalex.org/W4323843786"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W2049795142","https://openalex.org/W2361708288","https://openalex.org/W2174300598","https://openalex.org/W4295067341","https://openalex.org/W2787546317","https://openalex.org/W2162239985","https://openalex.org/W2584878234"],"abstract_inverted_index":{"At":[0,46],"Crypto":[1],"2019,":[2],"Gohr":[3],"first":[4],"adopted":[5],"the":[6,23,31,34,38,61,68,87,107,119,136,164,173,182,189,210,222,226,239,250,253,263,268,272,281,284],"neural":[7,32,42,57,62,70,84,254,285],"distinguisher":[8,85,255],"for":[9,60,292],"differential":[10,167,212],"cryptanalysis,":[11],"and":[12,29,92,110,114,129,169,199,218,295],"since":[13],"then,":[14],"this":[15,100,275],"work":[16,25],"received":[17],"increasing":[18],"attention.":[19],"However,":[20],"most":[21],"of":[22,41,122,127,139,151,166,176,214,238,241,252,267,274,283],"existing":[24],"focuses":[26],"on":[27,55,135,209],"improving":[28],"applying":[30],"distinguisher,":[33],"studies":[35],"delving":[36],"into":[37],"intrinsic":[39,108],"principles":[40,109],"distinguishers":[43,63,71,286],"are":[44],"finite.":[45],"Eurocrypt":[47],"2021,":[48],"Benamira":[49,155],"et":[50,156],"al.":[51],"conducted":[52],"a":[53,125,146,246,258],"study":[54,106],"Gohr's":[56],"distinguisher.":[58],"But":[59],"proposed":[64],"later,":[65],"such":[66,95],"as":[67,81],"r-round":[69],"trained":[72],"with":[73,90],"k":[74,215,229],"ciphertext":[75,78,140,186,216,223,230],"pairs":[76,217,231],"or":[77],"differences,":[79],"denoted":[80],"$ND^{cp}_{k\\_{r}}$":[82,89],"(Gohr's":[83],"is":[86,97,232],"special":[88],"k=1)":[91],"$ND^{cd}_{k\\_{r}}$":[93,113],",":[94],"research":[96],"lacking.":[98],"In":[99],"work,":[101],"we":[102,117,159,244,277],"devote":[103],"ourselves":[104],"to":[105,149,181,197,204,248,261,279,290],"relationship":[111],"between":[112,184,228],"$ND^{cp}_{k\\_{r}}$.":[115],"Firstly,":[116],"explore":[118],"working":[120],"principle":[121],"$ND^{cd}_{1\\_{r}}$":[123],"through":[124],"series":[126],"experiments":[128],"find":[130],"that":[131,150,201],"it":[132],"strongly":[133],"relies":[134,208],"probability":[137,213],"distribution":[138],"differences.":[141],"Its":[142],"operational":[143],"mechanism":[144],"bears":[145],"strong":[147],"resemblance":[148],"$ND^{cp}_{1\\_{r}}$":[152,177],"given":[153],"by":[154,256,287],"al..":[157],"Therefore,":[158],"further":[160],"compare":[161],"them":[162],"from":[163],"perspective":[165],"cryptanalysis":[168],"sample":[170],"features,":[171],"demonstrating":[172],"superior":[174],"performance":[175],"can":[178],"be":[179],"attributed":[180],"relationships":[183,220],"certain":[185],"bits,":[187],"especially":[188],"significant":[190],"bits.":[191],"We":[192],"then":[193],"extend":[194],"our":[195,242],"investigation":[196],"$ND^{cp}_{k\\_{r}}$,":[198],"show":[200],"its":[202],"ability":[203],"recognize":[205],"samples":[206,265],"heavily":[207],"average":[211],"some":[219],"in":[221,236],"itself,":[224],"but":[225],"reliance":[227],"very":[233],"weak.":[234],"Finally,":[235],"light":[237],"findings":[240],"research,":[243],"introduce":[245],"strategy":[247],"enhance":[249],"accuracy":[251,282],"using":[257],"fixed":[259],"difference":[260],"generate":[262],"negative":[264],"instead":[266],"random":[269],"one.":[270],"Through":[271],"implementation":[273],"approach,":[276],"manage":[278],"improve":[280],"approximately":[288],"2%":[289],"8%":[291],"7-round":[293],"Speck32/64":[294],"9-round":[296],"Simon32/64.":[297]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
