Data encryption for internet of things applications based on catalan objects and two combinatorial structures

MH Saračević, SZ Adamović… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
This article presents a novel data encryption technique suitable for Internet of Things (IoT)
applications. The cryptosystem is based on the application of a Catalan object (as a …

A deep bidirectional LSTM-GRU network model for automated ciphertext classification

E Ahmadzadeh, H Kim, O Jeong, N Kim, I Moon - Ieee Access, 2022 - ieeexplore.ieee.org
Long Short-Term Memory (LSTM) and Gated Recurrent Units (GRU) are a class of Recurrent
Neural Networks (RNN) suitable for sequential data processing. Bidirectional LSTM …

[PDF][PDF] Various approaches towards cryptanalysis

S Prajapat, RS Thakur - International Journal of Computer Applications, 2015 - Citeseer
Cryptanalysis is very important step for auditing and checking strength of any cryptosystem.
Some of these cryptosystem ensures confidentiality and security of large information …

Pattern analysis of cipher text: A combined approach

S Mishra, A Bhattacharjya - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
In this paper, we propose and implement a combined approach for identification of a given
unknown sample of cipher text. In the first part of system, cipher text samples are generated …

[PDF][PDF] Cryptic mining in light of artificial intelligence

S Prajapat, A Thakur, K Maheshwari… - … On Advances In …, 2015 - researchgate.net
“The analysis of cryptic text is hard problem”, and there is no fixed algorithm for generating
plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis …

Security Analysis of Cryptographic Algorithms: Hints from Machine Learning

M Paravisi, A Visconti, D Malchiodi - International Conference on …, 2024 - Springer
There are several methodologies available for analyzing the security of cryptographic
algorithms, each relying on the ability to represent the cipher using mathematical or logical …

Cryptanalysis and Security Evaluation Using Artificial Neural Networks

N Vukobrat, S Adamović, N Maček… - Integration of WSNs …, 2021 - taylorfrancis.com
This chapter introduces a novel methodology for determining mutual information between
the secret key and cypher message. The methodology is based on using artificial …

YAPAY SİNİR AĞLARI İLE KLASİK KRİPTOGRAFİ ALGORİTMALARININ ŞİFRELİ VERİLER ÜZERİNDEN SINIFLANDIRILMASI

S Türk, R Şamlı - Uludağ Üniversitesi Mühendislik Fakültesi Dergisi, 2020 - dergipark.org.tr
Şifreleme bilimi olarak ifade edilebilecek olan kriptoloji için kullanılan algoritmaların temel
amacı bir noktadan bir noktaya iletilen, ya da herhangi bir ortamda saklanan verilere izinsiz …

[PDF][PDF] Intelligency Incipher Analysis

AN Khan, MY Fan, R Alam - researchgate.net
Automated analysis of Cryptographic Algorithms is one of the needs of present times so as
to improve the efficiency as well as the security of any Cryptographic Algorithm. The present …

Encryption technique using dynamic table and block division process on binary field

R Choudhary, S Som - 2016 5th International Conference on …, 2016 - ieeexplore.ieee.org
In this paper a new cryptographic algorithm is proposed. Three Keys are used in this
technique for encryption and decryption of data. The technique has generated an …