Preimage Attacks Against Lightweight Scheme Xoodyak Based on Deep Learning
暂无分享,去创建一个
Weidong Qiu | Peng Tang | Guozhen Liu | Jingwen Lu | Huina Li | Guozhen Liu | Huina Li | Jing-You Lu | Tang Peng | Qiu Weidong
[1] Joan Daemen,et al. The design of Xoodoo and Xoofff , 2018, IACR Trans. Symmetric Cryptol..
[2] Mohammed M. Alani,et al. Neuro-cryptanalysis of DES , 2012, World Congress on Internet Security (WorldCIS-2012).
[3] Xinyi Hu,et al. Research on Plaintext Restoration of AES Based on Neural Network , 2018, Secur. Commun. Networks.
[4] T. Godhavari,et al. Cryptography Using Neural Network , 2005, 2005 Annual IEEE India Conference - Indicon.
[5] Brahmjit Singh,et al. Lightweight Cryptography: A Solution to Secure IoT , 2020, Wirel. Pers. Commun..
[6] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[7] Sachin Ahuja,et al. Academic Performance Prediction Using Data Mining Techniques: Identification of Influential Factors Effecting the Academic Performance in Undergrad Professional Course , 2018, Harmony Search and Nature Inspired Optimization Algorithms.
[8] Min-Shiang Hwang,et al. A remote password authentication scheme for multiserver architecture using neural networks , 2001, IEEE Trans. Neural Networks.
[9] Khalid A. Eldrandaly. An Intelligent MCDM Approach for Selecting the Suitable Expert System Building Tool , 2007, Int. Arab J. Inf. Technol..
[10] Jaewoo So,et al. Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers , 2020, Secur. Commun. Networks.
[11] W. Kinzel,et al. Secure exchange of information by synchronization of neural networks , 2002 .
[12] Jakub Breier,et al. Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers , 2021, 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[13] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[14] Alaa H. Alhamami,et al. Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis , 2012, Int. Arab J. Inf. Technol..
[15] Willi Meier,et al. Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak , 2019, IACR Cryptol. ePrint Arch..
[16] Aron Gohr,et al. Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning , 2019, CRYPTO.
[17] Binod Kumar Kanaujia,et al. Theoretical Analysis and Design of High-Stable-Gain Antenna with Ultrawide Band Capabilities and Suppressed Back Radiations , 2020, Wirel. Pers. Commun..
[18] Alaa H. Alhamami,et al. Attack and construction of simulator for some cipher systems using neuro-Identifier , 2010, Int. Arab J. Inf. Technol..
[19] Mohammed M. Alani,et al. Neuro-Cryptanalysis of DES and Triple-DES , 2012, ICONIP.
[20] Ronald L. Rivest,et al. Cryptography and Machine Learning , 1991, ASIACRYPT.
[21] Alaa H. Alhamami,et al. Attack of Against Simplified Data Encryption Standard Cipher System Using Neural Networks , 2010 .
[22] Babak Sadeghiyan,et al. Finding the differential characteristics of block ciphers with neural networks , 2008, Inf. Sci..
[23] B. Chandra,et al. Applications of Cascade Correlation Neural Networks for Cipher System Identification , 2007 .