메뉴 건너뛰기




Volumn 6, Issue 1, 2010, Pages 29-35

Attack of against simplified data encryption standard cipher system using neural networks

Author keywords

Artificial neural network; Black box and neuro identifier; Cipher system; Cryptanalysis; Emulation; SDES; System identification

Indexed keywords


EID: 77952514019     PISSN: 15493636     EISSN: None     Source Type: Journal    
DOI: 10.3844/jcssp.2010.29.35     Document Type: Article
Times cited : (13)

References (24)
  • 1
    • 78649496898 scopus 로고    scopus 로고
    • Attack and construction of simulator for some of cipher systems using neuro-identifier
    • Alallayah, K.M., W.F.M. Amin and A.H. Hamami, 2010. Attack and construction of simulator for some of cipher systems using neuro-identifier. Int. Arab J. Inform. Technol., 7.
    • (2010) Int. Arab J. Inform. Technol. , pp. 7
    • Alallayah, K.M.1    Amin, W.F.M.2    Hamami, A.H.3
  • 2
    • 18344396961 scopus 로고    scopus 로고
    • An integrated approach utilizing artificial neural networks and SELDI mass spectrometry for the classification of human tumours and rapid identification of potential biomarkers
    • Ball, G., S. Mian, F. Holding, R.O. Allibone and J. Lowe et al., 2002. An integrated approach utilizing artificial neural networks and SELDI mass spectrometry for the classification of human tumours and rapid identification of potential biomarkers. Bioinformatics, 18: 395-404. http://www.ncbi.nlm.nih.gov/pubmed/11934738.
    • (2002) Bioinformatics , vol.18 , pp. 95-404
    • Ball, G.1    Mian, S.2    Holding, F.3    Allibone, R.O.4    Lowe, J.5
  • 3
    • 0031673055 scopus 로고    scopus 로고
    • Upper bounds on the number of hidden neurons in feed forward networks with arbitrary bounded nonlinear activation functions
    • Bin, H.G. and H.A. Babri, 1998. Upper bounds on the number of hidden neurons in feed forward networks with arbitrary bounded nonlinear activation functions. IEEE. Trans. Neural Networks, 9: 224-229. http://cat.inist.fr/?aModele=afficheN&cpsidt=2134 110 J. Computer Sci., 6 (1): 29-35, 2010 35.
    • (1998) IEEE. Trans. Neural Networks , vol.9 , pp. 224-229
    • Bin, H.G.1    Babri, H.A.2
  • 4
    • 0030129076 scopus 로고    scopus 로고
    • Adaptive control of nonlinear systems via approximate linearization
    • Blankenship, G.L. and R.G. Ghanadan, 1996. Adaptive control of nonlinear systems via approximate linearization. IEEE. Trans. Control, 41: 618-625. http://cat.inist.fr/?aModele=afficheN&cpsidt=3058423.
    • (1996) IEEE. Trans. Control. , vol.41 , pp. 618-625
    • Blankenship, G.L.1    Ghanadan, R.G.2
  • 6
    • 77952469632 scopus 로고    scopus 로고
    • Nonlinear time series models for multivariable dynamic processes chemometrics and intelligent laboratory systems
    • Cinar, A., 1996. Nonlinear time series models for multivariable dynamic processes chemometrics and intelligent laboratory systems. Coden Cilsen, 30: 147-158.
    • (1996) Coden Cilsen , vol.30 , pp. 147-158
    • Cinar, A.1
  • 7
    • 34547293248 scopus 로고    scopus 로고
    • Using gene neural networks to drug target identification
    • 2005-12-07
    • Jiang, Z. and Y. Zhou, 2006. Using gene neural networks to drug target identification. J. Integrat. Bioinform., 2005-12-07.
    • (2006) J. Integrat. Bioinform.
    • Jiang, Z.1    Zhou, Y.2
  • 8
    • 0033716744 scopus 로고    scopus 로고
    • Efficient training of neural nets for non-linear adaptive filtering using a recursive levenberg-marquardt algorithm
    • DOI: 10.1109/78.847778
    • Leaster, N.S.H. and J. Sjoberg, 2000. Efficient training of neural nets for non-linear adaptive filtering using a recursive levenberg-marquardt algorithm. IEEE. Trans. Sign. Process., 48: 1915-1927. DOI: 10.1109/78.847778.
    • (2000) IEEE. Trans. Sign. Process. , vol.48 , pp. 1915-1927
    • Leaster, N.S.H.1    Sjoberg, J.2
  • 9
    • 77952474973 scopus 로고
    • System Identification, Theory for the User
    • Oxford University Press, New York, USA., ISBN: 0138816409
    • Lennart, L., 1987. System Identification, Theory for the User. Englewood Cliffs. Prentice-Hall, Inc., Oxford University Press, New York, USA., ISBN: 0138816409, pp: 519.
    • (1987) Englewood Cliffs. Prentice-Hall, Inc. , pp. 519
    • Lennart, L.1
  • 12
    • 77952508872 scopus 로고    scopus 로고
    • Cryptanalysis of simplified data encryption standard via optimization heuristics
    • Dec. 14-17, IEEE Computer Society, Bangalore, DOI: 10.1109/ICISIP.2005.1619415
    • Nalini, N. and G.R. Rao, 2006. Cryptanalysis of simplified data encryption standard via optimization heuristics. Proceeding of the 3rd International Conference on Intelligent Sensing and Information Processing, Dec. 14-17, IEEE Computer Society, Bangalore, pp: 74-79. DOI: 10.1109/ICISIP.2005.1619415.
    • (2006) Proceeding of the 3rd International Conference on Intelligent Sensing and Information Processing , pp. 74-79
    • Nalini, N.1    Rao, G.R.2
  • 15
    • 51749089768 scopus 로고    scopus 로고
    • System identification for the Hodgkin-Huxley model using artificial neural networks
    • Aug. 12-17, IEEE Xplore Press, Orlando, FL., DOI: 10.1109/IJCNN.2007.4371306
    • Saggar, M., T. Mericli, S. Andoni and R. Iikkulainen, 2007. System identification for the Hodgkin-Huxley model using artificial neural networks. Proceeding of the International Joint Conference on Neural Networks, Aug. 12-17, IEEE Xplore Press, Orlando, FL., pp: 2239-2244. DOI: 10.1109/IJCNN.2007.4371306.
    • (2007) Proceeding of the International Joint Conference on Neural Networks , pp. 2239-2244
    • Saggar, M.1    Mericli, T.2    Andoni, S.3    Iikkulainen, R.4
  • 16
    • 0347458328 scopus 로고    scopus 로고
    • Newsgroup
    • Sarle, W.S., 2002. Neural Networks FAQ. Newsgroup: http://comp.ai.neuralnets.ftp://ftp.sas.com/pub/neural/FAQ.html.
    • (2002) Neural Networks FAQ
    • Sarle, W.S.1
  • 17
    • 33646825846 scopus 로고    scopus 로고
    • A simplified data encryption standard algorithm
    • Schaefer, E.F., 1996. A simplified data encryption standard algorithm. Cryptologia, 20: 77-84. http://direct.bl.uk/bld/PlaceOrder.do?UIN=003312008&ETOC=RN&from=searchengine.
    • (1996) Cryptologia , vol.20 , pp. 77-84
    • Schaefer, E.F.1
  • 18
  • 19
    • 33748137072 scopus 로고
    • Comparative study of two neural network approaches for nonlinear identification
    • Apr. 13-16, IEEE Xplore Press, Hong Kong, DOI: 10.1109/SIPNN.1994.344865
    • Tanomaru, J., 1994. Comparative study of two neural network approaches for nonlinear identification. Proceeding of the International Symposium on Speech, Image Processing and Neural Networks, Apr. 13-16, IEEE Xplore Press, Hong Kong, pp: 487-490. DOI: 10.1109/SIPNN.1994.344865.
    • (1994) Proceeding of the International Symposium on Speech, Image Processing and Neural Networks , pp. 487-490
    • Tanomaru, J.1
  • 22
    • 0018443381 scopus 로고
    • Privacy and authentication: An introduction to cryptography
    • Whitfield, D. and M.E. Hellman, 1979. Privacy and authentication: An introduction to cryptography. Proc. IEEE., 67: 397-427.
    • (1979) Proc. IEEE. , vol.67 , pp. 397-427
    • Whitfield, D.1    Hellman, M.E.2
  • 24
    • 0242474699 scopus 로고
    • Neural Approximation: A Control Perspective
    • Advances in Industrial Control, Hunt, K.J., G.R. Irwin and K. Warwick (Eds.). Springer-Verlag, Berlin
    • Zbikowski, R. and A. Dzielinski, 1995. Neural Approximation: A Control Perspective. In: Neural Network Engineering in Dynamic Control Systems, Advances in Industrial Control, Hunt, K.J., G.R. Irwin and K. Warwick (Eds.). Springer-Verlag, Berlin, pp: 1-25.
    • (1995) Neural Network Engineering in Dynamic Control Systems , pp. 1-25
    • Zbikowski, R.1    Dzielinski, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.