Preimage Attacks Against Lightweight Scheme Xoodyak Based on Deep Learning

[1]  Joan Daemen,et al.  The design of Xoodoo and Xoofff , 2018, IACR Trans. Symmetric Cryptol..

[2]  Mohammed M. Alani,et al.  Neuro-cryptanalysis of DES , 2012, World Congress on Internet Security (WorldCIS-2012).

[3]  Xinyi Hu,et al.  Research on Plaintext Restoration of AES Based on Neural Network , 2018, Secur. Commun. Networks.

[4]  T. Godhavari,et al.  Cryptography Using Neural Network , 2005, 2005 Annual IEEE India Conference - Indicon.

[5]  Brahmjit Singh,et al.  Lightweight Cryptography: A Solution to Secure IoT , 2020, Wirel. Pers. Commun..

[6]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[7]  Sachin Ahuja,et al.  Academic Performance Prediction Using Data Mining Techniques: Identification of Influential Factors Effecting the Academic Performance in Undergrad Professional Course , 2018, Harmony Search and Nature Inspired Optimization Algorithms.

[8]  Min-Shiang Hwang,et al.  A remote password authentication scheme for multiserver architecture using neural networks , 2001, IEEE Trans. Neural Networks.

[9]  Khalid A. Eldrandaly An Intelligent MCDM Approach for Selecting the Suitable Expert System Building Tool , 2007, Int. Arab J. Inf. Technol..

[10]  Jaewoo So,et al.  Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers , 2020, Secur. Commun. Networks.

[11]  W. Kinzel,et al.  Secure exchange of information by synchronization of neural networks , 2002 .

[12]  Jakub Breier,et al.  Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers , 2021, 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[13]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[14]  Alaa H. Alhamami,et al.  Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis , 2012, Int. Arab J. Inf. Technol..

[15]  Willi Meier,et al.  Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak , 2019, IACR Cryptol. ePrint Arch..

[16]  Aron Gohr,et al.  Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning , 2019, CRYPTO.

[17]  Binod Kumar Kanaujia,et al.  Theoretical Analysis and Design of High-Stable-Gain Antenna with Ultrawide Band Capabilities and Suppressed Back Radiations , 2020, Wirel. Pers. Commun..

[18]  Alaa H. Alhamami,et al.  Attack and construction of simulator for some cipher systems using neuro-Identifier , 2010, Int. Arab J. Inf. Technol..

[19]  Mohammed M. Alani,et al.  Neuro-Cryptanalysis of DES and Triple-DES , 2012, ICONIP.

[20]  Ronald L. Rivest,et al.  Cryptography and Machine Learning , 1991, ASIACRYPT.

[21]  Alaa H. Alhamami,et al.  Attack of Against Simplified Data Encryption Standard Cipher System Using Neural Networks , 2010 .

[22]  Babak Sadeghiyan,et al.  Finding the differential characteristics of block ciphers with neural networks , 2008, Inf. Sci..

[23]  B. Chandra,et al.  Applications of Cascade Correlation Neural Networks for Cipher System Identification , 2007 .