Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Learning the enigma with recurrent neural networks
S Greydanus - arxiv preprint arxiv:1708.07576, 2017 - arxiv.org
Recurrent neural networks (RNNs) represent the state of the art in translation, image
captioning, and speech recognition. They are also capable of learning algorithmic tasks …
captioning, and speech recognition. They are also capable of learning algorithmic tasks …
Research on plaintext restoration of AES based on neural network
X Hu, Y Zhao - Security and Communication Networks, 2018 - Wiley Online Library
Known plaintext attack is a common attack method in cryptographic attack. For ciphertext,
only known part of the plaintext but unknown key, how to restore the rest of the plaintext is an …
only known part of the plaintext but unknown key, how to restore the rest of the plaintext is an …
Artificial neural network for steganography
S Husien, H Badi - Neural Computing and Applications, 2015 - Springer
The digital information revolution has brought about changes in our society and our lives.
The many advantages of digital information have also generated new challenges and new …
The many advantages of digital information have also generated new challenges and new …
[PDF][PDF] Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis.
The problem in cryptanalysis can be described as an unknown and the neural networks are
ideal tools for black-box system identification. In this paper, a mathematical black-box model …
ideal tools for black-box system identification. In this paper, a mathematical black-box model …
Dual security method for digital image using HBV encryption and least significant bit steganography
This study proposes a combination of two security techniques, namely steganography and
cryptography. The proposed steganography technique is LSB because it has advantages in …
cryptography. The proposed steganography technique is LSB because it has advantages in …
Imperceptible and secure image watermarking using DCT and random spread technique
Watermarking is a copyright protection technique, while cryptography is a message
encoding technique. Imperceptibility, robustness, and safety are aspects that are often …
encoding technique. Imperceptibility, robustness, and safety are aspects that are often …
Preimage attacks against lightweight scheme Xoodyak based on deep learning
G Liu, J Lu, H Li, P Tang, W Qiu - … : Proceedings of the 2021 Future of …, 2021 - Springer
With the rapid progress in the artificial intelligence field, machine learning algorithms have
been utilized to construct cryptographic schemes and conduct cryptanalysis. In this paper …
been utilized to construct cryptographic schemes and conduct cryptanalysis. In this paper …
[PDF][PDF] Various approaches towards cryptanalysis
S Prajapat, RS Thakur - International Journal of Computer Applications, 2015 - Citeseer
Cryptanalysis is very important step for auditing and checking strength of any cryptosystem.
Some of these cryptosystem ensures confidentiality and security of large information …
Some of these cryptosystem ensures confidentiality and security of large information …
Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method.
B Harjo… - International Journal of …, 2021 - search.ebscohost.com
This study proposes the hybrid substitution cryptography method followed by chaotic
methods to improve the security of digital image transactions on the internet. The substitution …
methods to improve the security of digital image transactions on the internet. The substitution …
Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
Background Data transmissions using the DNP3 protocol over the internet in SCADA
systems are vulnerable to interruption, interception, fabrication, and modification through …
systems are vulnerable to interruption, interception, fabrication, and modification through …