Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Ongee Jeong"'
Publikováno v:
Mathematics, Vol 12, Iss 13, p 1936 (2024)
In this paper, we perform neural cryptanalysis on five block ciphers: Data Encryption Standard (DES), Simplified DES (SDES), Advanced Encryption Standard (AES), Simplified AES (SAES), and SPECK. The block ciphers are investigated on three different d
Externí odkaz:
https://doaj.org/article/2f22e56cdb674af791aa8c9854ca1e7c
Publikováno v:
IEEE Access, Vol 10, Pp 3228-3237 (2022)
Long Short-Term Memory (LSTM) and Gated Recurrent Units (GRU) are a class of Recurrent Neural Networks (RNN) suitable for sequential data processing. Bidirectional LSTM (BLSTM) enables a better understanding of context by learning the future time ste
Externí odkaz:
https://doaj.org/article/5b97819f86ce437dba9f1515246ec180
Publikováno v:
IEEE Access, Vol 9, Pp 136126-136134 (2021)
With the emergence of cloud computing, large amounts of private data are stored and processed in the cloud. On the other hand, data owners (users) may not want to reveal data information to cloud providers to protect their privacy. Therefore, users m
Externí odkaz:
https://doaj.org/article/4eabc6c8526a4944ba548e50740bb782
Publikováno v:
IEEE Access, Vol 9, Pp 60960-60970 (2021)
Information security has become an intrinsic part of data communication. Cryptanalysis using deep learning–based methods to identify weaknesses in ciphers has not been thoroughly studied. Recently, long short-term memory (LSTM) networks have shown
Externí odkaz:
https://doaj.org/article/f2569061de514b439bf47379381ae840
Publikováno v:
IEEE Access, Vol 9, Pp 60960-60970 (2021)
Information security has become an intrinsic part of data communication. Cryptanalysis using deep learning–based methods to identify weaknesses in ciphers has not been thoroughly studied. Recently, long short-term memory (LSTM) networks have shown
Publikováno v:
Optics and Lasers in Engineering. 146:106695
A depth slice image that is computationally reconstructed from an integral imaging system consists of focused and out of focus areas. The unfocused areas affect three-dimensional (3D) image analyses and visualization including 3D object detection, ex
Publikováno v:
OSA Continuum. 4:2245
Digital cryptosystems can provide perfect forward secrecy (PFS) for key exchange protocols based on the Diffie–Hellman (DH) scheme. However, key exchange algorithms are optimally designed only to encode small datasets, such as text and voice sets,