{"id":"https://openalex.org/W7136975580","doi":"https://doi.org/10.46586/tosc.v2026.i1.441-467","title":"Fourier Analysis of Neural Distinguishers","display_name":"Fourier Analysis of Neural Distinguishers","publication_year":2026,"publication_date":"2026-03-16","ids":{"openalex":"https://openalex.org/W7136975580","doi":"https://doi.org/10.46586/tosc.v2026.i1.441-467"},"language":"en","primary_location":{"id":"doi:10.46586/tosc.v2026.i1.441-467","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2026.i1.441-467","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12792/12481","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12792/12481","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053201079","display_name":"Yufei Yuan","orcid":"https://orcid.org/0009-0005-4054-6854"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yufei Yuan","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, 100190, China; University of Chinese Academy of Sciences, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, 100190, China; University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022492800","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0002-7974-5544"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, 100190, China; University of Chinese Academy of Sciences, Beijing, 100049, China; Zhongguancun Laboratory, Beijing, 100194, China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, 100190, China; University of Chinese Academy of Sciences, Beijing, 100049, China; Zhongguancun Laboratory, Beijing, 100194, China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129630455","display_name":"Lei Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Zhang","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, 100190, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, 100190, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China","institution_ids":["https://openalex.org/I4210128818"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046681629","display_name":"Ruichen Wu","orcid":"https://orcid.org/0000-0002-3163-7683"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruichen Wu","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, 100190, China; University of Chinese Academy of Sciences, Beijing, 100049, China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, 100190, China; University of Chinese Academy of Sciences, Beijing, 100049, China","institution_ids":["https://openalex.org/I4210128818"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053201079"],"corresponding_institution_ids":["https://openalex.org/I4210128818"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.84848323,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2026","issue":"1","first_page":"441","last_page":"467"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9205999970436096,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9205999970436096,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.01759999990463257,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.01679999940097332,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.6801999807357788},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6690000295639038},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.5690000057220459},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5048999786376953},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4706999957561493},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4316999912261963},{"id":"https://openalex.org/keywords/fourier-transform","display_name":"Fourier transform","score":0.428600013256073}],"concepts":[{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6801999807357788},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6690000295639038},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6389999985694885},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5918999910354614},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.5690000057220459},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5156000256538391},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5048999786376953},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4706999957561493},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4316999912261963},{"id":"https://openalex.org/C102519508","wikidata":"https://www.wikidata.org/wiki/Q6520159","display_name":"Fourier transform","level":2,"score":0.428600013256073},{"id":"https://openalex.org/C207864730","wikidata":"https://www.wikidata.org/wiki/Q179467","display_name":"Fourier series","level":2,"score":0.4205999970436096},{"id":"https://openalex.org/C203024314","wikidata":"https://www.wikidata.org/wiki/Q1365258","display_name":"Fourier analysis","level":3,"score":0.3596999943256378},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3273000121116638},{"id":"https://openalex.org/C2986587452","wikidata":"https://www.wikidata.org/wiki/Q938438","display_name":"Statistical analysis","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3190000057220459},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29589998722076416},{"id":"https://openalex.org/C176248197","wikidata":"https://www.wikidata.org/wiki/Q458526","display_name":"Probably approximately correct learning","level":4,"score":0.2809999883174896},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.27630001306533813},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2669999897480011}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tosc.v2026.i1.441-467","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2026.i1.441-467","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12792/12481","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:279c71a0933245adb36c0a106a0711a1","is_oa":true,"landing_page_url":"https://doaj.org/article/279c71a0933245adb36c0a106a0711a1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Symmetric Cryptology, Vol 2026, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tosc.v2026.i1.441-467","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tosc.v2026.i1.441-467","pdf_url":"https://tosc.iacr.org/index.php/ToSC/article/download/12792/12481","source":{"id":"https://openalex.org/S4210236173","display_name":"IACR Transactions on Symmetric Cryptology","issn_l":"2519-173X","issn":["2519-173X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Symmetric Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7136975580.pdf","grobid_xml":"https://content.openalex.org/works/W7136975580.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Recent":[0],"studies":[1],"have":[2],"consistently":[3],"demonstrated":[4],"the":[5,26,63,67,85,103,136,162,170,176,182,198],"significant":[6],"potential":[7],"of":[8,19,28,44,87,127,161,200],"deep":[9],"learning":[10,69],"for":[11],"distinguishing":[12],"attacks":[13],"in":[14,54,71,125,140],"cryptanalysis.":[15],"A":[16],"considerable":[17],"body":[18],"research":[20,83],"has":[21],"focused":[22],"on":[23,102],"progressively":[24],"improving":[25],"accuracy":[27],"these":[29,46],"methods":[30],"across":[31],"various":[32],"block":[33,88],"ciphers.":[34],"However,":[35],"to":[36,61,107,134,196],"date,":[37],"there":[38],"is":[39,132],"still":[40],"little":[41],"theoretical":[42],"understanding":[43],"why":[45],"approaches":[47],"succeed.":[48],"Furthermore,":[49],"a":[50,72,76,99,147,159,204],"notable":[51],"deficiency":[52],"lies":[53],"their":[55],"interpretability;":[56],"specifically,":[57],"researchers":[58],"are":[59],"unable":[60],"discern":[62],"features":[64],"learned":[65,175],"by":[66,94],"machine":[68],"algorithms":[70],"human-understandable":[73],"form.":[74],"To":[75],"certain":[77],"extent,":[78],"this":[79,95,116],"limitation":[80],"impedes":[81],"further":[82],"into":[84],"security":[86],"ciphers":[89],"and":[90,109],"extension":[91],"attacks.":[92],"Motivated":[93],"gap,":[96],"we":[97,118,145,167,193],"propose":[98],"method":[100],"based":[101],"Goldreich-":[104],"Levin":[105],"algorithm":[106],"analyze":[108],"interpret":[110],"what":[111],"black-box":[112],"distinguishers":[113,124,179],"learn.":[114],"With":[115],"approach,":[117],"reinterpret":[119],"some":[120],"established":[121],"advanced":[122],"neural":[123,138,152,171],"terms":[126],"Fourier":[128,142,201],"representation.":[129],"Specifically,":[130],"it":[131],"able":[133],"resolve":[135],"previous":[137],"distinguisher":[139,149],"several":[141],"terms.":[143],"Notably,":[144],"identify":[146],"new":[148],"technique":[150],"from":[151],"networks,":[153],"which":[154],"can":[155],"be":[156],"considered":[157],"as":[158],"generalization":[160],"Differential-Linear":[163],"(DL)":[164],"distinguishers.":[165],"Moreover,":[166],"demonstrate":[168],"that":[169],"network":[172],"not":[173],"only":[174],"optimal":[177],"DL":[178],"found":[180],"using":[181,203],"existing":[183],"MILP/MIQCP":[184],"model,":[185],"but":[186],"also":[187],"discovered":[188],"even":[189],"superior":[190],"ones.":[191],"Finally,":[192],"discuss":[194],"how":[195],"determine":[197],"weights":[199],"representation":[202],"statistical":[205],"method.":[206]},"counts_by_year":[],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2026-03-17T00:00:00"}
