Impact of machine learning algorithms on analysis of stream ciphers
暂无分享,去创建一个
Sanchit Gupta | Naveen Kumar | Amit Singhal | Shri Kant | Rachit Dhasmana | Shri Kant | N. Kumar | Amit Singhal | Sanchit Gupta | Rachit Dhasmana
[1] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[2] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[3] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[4] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[5] Geoffrey I. Webb,et al. Averaged One-Dependence Estimators: Preliminary Results , 2002, AusDM.
[6] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[7] Shehroz S. Khan,et al. Analyzing a class of pseudo-random bit generator through inductive machine learning paradigm , 2006, Intell. Data Anal..
[8] Nir Friedman,et al. Building Classifiers Using Bayesian Networks , 1996, AAAI/IAAI, Vol. 2.
[9] Jacob Ziv,et al. An efficient universal prediction algorithm for unknown sources with limited training data , 2002, IEEE Trans. Inf. Theory.
[10] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[11] Geoffrey I. Webb,et al. Lazy Bayesian Rules: A Lazy Semi-Naive Bayesian Learning Technique Competitive to Boosting Decision Trees , 1999, ICML.
[12] A. Biryukov. A New 128-bit Key Stream Cipher LEX , 2005 .
[13] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[14] Hu Chuan-Gan,et al. On The Shift Register Sequences , 2004 .
[15] Mark A. Pitt,et al. Advances in Minimum Description Length: Theory and Applications , 2005 .
[16] Markus Dichtl,et al. Document NES / DOC / SAG / WP 3 / 019 / 2 y About the NESSIE Submission \ Using the general next bit predictor like an evaluation criteria " , 2001 .
[17] J.M. Sierra,et al. Using classifiers to predict linear feedback shift registers , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).
[18] J. Ross Quinlan,et al. Improved Use of Continuous Attributes in C4.5 , 1996, J. Artif. Intell. Res..
[19] William Millan,et al. Dragon: A Fast Word Based Stream Cipher , 2004, ICISC.
[20] Philip Hawkes,et al. Specification for NLSv2 , 2008, The eSTREAM Finalists.
[21] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[22] Martin Boesgaard,et al. The Stream Cipher Rabbit , 2005 .
[23] T. Bayes,et al. Studies in the History of Probability and Statistics: IX. Thomas Bayes's Essay Towards Solving a Problem in the Doctrine of Chances , 1958 .