Research on Grain-128's cryptosystem recognition
暂无分享,去创建一个
[1] S.P. Mansoor,et al. Classifying encryption algorithms using pattern recognition techniques , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[2] Seokhie Hong,et al. Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 , 2008, ACISP.
[3] Allan Tomlinson,et al. A Distinguishing Attack with a Neural Network , 2013, 2013 IEEE 13th International Conference on Data Mining Workshops.
[4] Chellu Chandra Sekhar,et al. Identification of Block Ciphers using Support Vector Machines , 2006, The 2006 IEEE International Joint Conference on Neural Network Proceedings.
[5] 盛合 志帆,et al. Design and analysis of block ciphers , 2003 .
[6] Adi Shamir,et al. Breaking Grain-128 with Dynamic Cube Attacks , 2011, IACR Cryptol. ePrint Arch..
[7] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[8] G. Griffin,et al. Caltech-256 Object Category Dataset , 2007 .
[9] R. Anitha,et al. Identification of Encryption Algorithm Using Decision Tree , 2011 .
[10] Shai Halevi,et al. Cryptanalysis of Stream Ciphers with Linear Masking , 2002, CRYPTO.
[11] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[12] Vincent Rijmen,et al. The eSTREAM Portfolio (rev. 1) , 2008 .
[13] Hideki Imai,et al. Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128 , 2012, Period. Math. Hung..