The dichotomy of neural networks and cryptography: war and peace

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …

A deep bidirectional LSTM-GRU network model for automated ciphertext classification

E Ahmadzadeh, H Kim, O Jeong, N Kim, I Moon - IEEE access, 2022 - ieeexplore.ieee.org
Long Short-Term Memory (LSTM) and Gated Recurrent Units (GRU) are a class of Recurrent
Neural Networks (RNN) suitable for sequential data processing. Bidirectional LSTM …

Detect phishing website by fuzzy multi-criteria decision making

RK Shah, MK Hasan, S Islam, A Khan… - … Conference on AI in …, 2022 - ieeexplore.ieee.org
Phishing activity is undertaken by the hackers to compromise the computer networks and
financial system. A compromised computer system or network provides data and or …

The Dichotomy of Crypto and NN: War and Peace

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
In recent years, NNs, as the basic components in AI models and cryptographic schemes,
have come together in war and peace; a cross-impact forms a dichotomy deserving a …

[書籍][B] Crypto and AI: From Coevolution to Quantum Revolution

B Zolfaghari, HR Nemati, N Yanai, K Bibak - 2023 - Springer
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …

Crypto and AI

B Zolfaghari, H Nemati, N Yanai, K Bibak - Springer
After some introductory discussions in Sect. 1.1, this chapter studies the role of AI in the
ecosystem of cryptography (Sect. 1.2). The chapter proceeds to study the role of …

Artificial Neural Networks Cryptanalysis of Merkle-Hellman Knapsack Cryptosystem

HT Alaoui, A Azouaoui, J El Kafi - International Conference on Advanced …, 2022 - Springer
Abstract Machine learning in general, and artificial neural networks in particular have been
used in many fields, and especially in cryptanalysis, showing good results for the recovery …

A New Technique of Cipher Type Identification Using Convolutional Neural Networks

S Sikdar, M Kule - … Conference on Computational Intelligence in Pattern …, 2022 - Springer
This paper focuses on modern cipher types classification mechanism using convolutional
neural networks (CNNs). In case of ciphertext-only-attack, it is momentous to a cryptanalyst …