Computer Science ›› 2026, Vol. 53 ›› Issue (3): 453-458.doi: 10.11896/jsjkx.250600176
• Information Security • Previous Articles Next Articles
SU Ruitao, REN Jiongjiong, CHEN Shaozhen
CLC Number:
| [1]BIHAM E,SHAMIR A.Differential cryptanalysis of DES-like cryptosystems[J].Journal of Cryptology,1991,4:3-72. [2]LAI X J.Higher order derivatives and differential cryptanalysis[C]//Proceeding of the Symposium on Communication,Coding and Cryptography.Springer,1994:10-13. [3]BIHAM E,BIRYUKOV A,SHAMIR A.Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials[C]//Advances in Cryptology—EUROCRYPT’99.Berlin:Springer,1999:12-23. [4]BIHAM E.New types of cryptanalytic attacks using relatedkeys[J].Journal of Cryptology,1994,7:229-246. [5]GOHR A.Improving attacks on round-reduced speck32/64using deep learning[C]//Advances in Cryptology-CRYPTO 2019.2019:150-179. [6]CHEN Y,YU H.A New Neural Distinguisher Model Considering Derived Features from Multiple Ciphertext Pairs[J].The Computer Journal,2023,66(6):1419-1433. [7]HOU Z,REN J,CHEN S.Improve neural distinguisher forcryptanalysis[EB/OL].https://eprint.iacr.org/2021/1017. [8]LU J,LIU G,SUN B,et al.Improved(related-key) differential-based neural distinguishers for SIMON and SIMECK block ciphers[J].The Computer Journal,2024,67(2):537-547. [9]BAO Z,LU J,YAO Y,et al.More insight on deep learning-aided cryptanalysis[C]//Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security.Singapore:Springer,2023:436-467. [10]SHEN D,SONG Y,LU Y,et al.Neural differential distingui-shers for GIFT-128 and ASCON[J].Journal of Information Secu-rity and Applications,2024,82:103758. [11]ZHANG L,WANG Z L,WANG B C.Improving Differential-Neural Cryptanalysis[J].IACR Communications in Cryptology,2024,1(3):13. [12]WANG G,WANG G,SUN S.Investigating and enhancing theneural distinguisher for differential cryptanalysis[J].IEICE Transactions on Information and Systems,2024,107:1016-1028. [13]SEOK B,LEE C.A novel approach to construct a good dataset for differential-neural cryptanalysis[J].IEEE Transactions on Dependable and Secure Computing,2024,22:246-262. [14]BANIK S,PANDEY S K,PEYRIN T,et al.GIFT:A smallpresent:Towards reaching the limit of lightweight encryption[C]//Proceedings of Cryptographic Hardware and Embedded Systems.Springer,2017:321-345. [15]DOBRUNIG C,EICHLSEDER M,MENDEL F,et al.Asconv1.2:lightweight authenticated encryption and hashing[J].Journal of Cryptology,2021,34:1-42. [16]BENAMIRA A,GERAULT D,PEYRIN T,et al.A DeeperLook at Machine Learning-Based Cryptanalysis[C]//Advances in Cryptology-EUROCRYPT 2021.Cham:Springer,2021:436-467. |
| [1] | FU Yukai, LI Qingzhen, DONG Zhixue, SHI Dongli, ZHAO Peng. Pedestrian Re-identification Methods Based on Limited Target Data and Deep Learning [J]. Computer Science, 2026, 53(3): 287-294. |
| [2] | YU Ding, LI Zhangwei. Prediction Method of RNA Secondary Structure Based on Transformer Architecture [J]. Computer Science, 2026, 53(3): 375-382. |
| [3] | DU Jiantong, GUAN Zeli, XUE Zhe. Multi-task Learning-based Ophthalmic Video Feature Fusion and Multi-dimensional Profiling [J]. Computer Science, 2026, 53(3): 383-391. |
| [4] | LI Zequn, DING Fei. Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning [J]. Computer Science, 2026, 53(3): 78-87. |
| [5] | XI Penghui, WU Xiazhen, JIANG Wencong, FANG Liangda, HE Chaobo, GUAN Quanlong. Review of Personalized Educational Resource Recommendations [J]. Computer Science, 2026, 53(2): 1-15. |
| [6] | HUANG Jing, WANG Teng, LIU Jian, HU Kai, PENG Xin, HUANG Yamin, WEN Yuanqiao. Multimodal Visual Detection for Underwater Sonar Target Images [J]. Computer Science, 2026, 53(2): 227-235. |
| [7] | LIU Chenhong, LI Fenglian, YANG Jia, WANG Suzhe, CHEN Guijun. Boundary-focused Multi-scale Feature Fusion Network for Stroke Lesion Segmentation [J]. Computer Science, 2026, 53(2): 264-272. |
| [8] | HUANG Miaomiao, WANG Huiying, WANG Meixia, WANG Yejiang , ZHAO Yuhai. Review of Graph Embedding Learning Research:From Simple Graph to Complex Graph [J]. Computer Science, 2026, 53(1): 58-76. |
| [9] | WANG Cheng, JIN Cheng. KAN-based Unsupervised Multivariate Time Series Anomaly Detection Network [J]. Computer Science, 2026, 53(1): 89-96. |
| [10] | XUE Jingyan, XIA Jianan, HUO Ruili, LIU Jie, ZHOU Xuezhong. Review of Retinal Image Analysis Methods for OCT/OCTA Based on Deep Learning [J]. Computer Science, 2026, 53(1): 128-140. |
| [11] | ZHOU Bingquan, JIANG Jie, CHEN Jiangmin, ZHAN Lixin. EvR-DETR:Event-RGB Fusion for Lightweight End-to-End Object Detection [J]. Computer Science, 2026, 53(1): 153-162. |
| [12] | YIN Shi, SHI Zhenyang, WU Menglin, CAI Jinyan, YU De. Deep Learning-based Kidney Segmentation in Ultrasound Imaging:Current Trends and Challenges [J]. Computer Science, 2025, 52(9): 16-24. |
| [13] | ZENG Lili, XIA Jianan, LI Shaowen, JING Maike, ZHAO Huihui, ZHOU Xuezhong. M2T-Net:Cross-task Transfer Learning Tongue Diagnosis Method Based on Multi-source Data [J]. Computer Science, 2025, 52(9): 47-53. |
| [14] | LI Yaru, WANG Qianqian, CHE Chao, ZHU Deheng. Graph-based Compound-Protein Interaction Prediction with Drug Substructures and Protein 3D Information [J]. Computer Science, 2025, 52(9): 71-79. |
| [15] | LUO Chi, LU Lingyun, LIU Fei. Partial Differential Equation Solving Method Based on Locally Enhanced Fourier NeuralOperators [J]. Computer Science, 2025, 52(9): 144-151. |
|
||