A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
Traditional cryptanalysis is typically performed using manual calculations or search- ing algorithms,which can be computationally costly and cannot produce additionalin- sights apart from what has been dictated by the cryptanalyst.
| Main Author: | Lee, Ting Rong |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/53219/ http://eprints.usm.my/53219/1/LEE%20TING%20RONG%20-%20TESIS24.pdf |
Similar Items
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
Lightweight block ciphers: A comparative study
by: Salim, Sufya, et al.
Published: (2012)
by: Salim, Sufya, et al.
Published: (2012)
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
Performance Evaluation Of Unidirectional Lightweight Encapsulation Using ns-2 And DVB-S Testbed.
by: Ang, Way-Chuang, et al.
Published: (2007)
by: Ang, Way-Chuang, et al.
Published: (2007)
Enhancing lightweight block cipher algorithm OLBCA
through decreasing cost factor
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
CDS503 – Machine Learning
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
CDS503 – Machine Learning
(Pembelajaran Mesin)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CDS503 – Machine Learning June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CDS503 – Machine Learning June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
by: PPSKOM, Pusat Pengajian Sains Komputer
CDS503 – Machine Learning
(Pembelajaran Mesin)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
A decision-theoretic approach to scientific inquiry exploratory learning environment
by: Ting, Choo Yee, et al.
Published: (2006)
by: Ting, Choo Yee, et al.
Published: (2006)
Unidirectional Lightweight Encapsulation With Header Compression For IP Based Satellite Communication Over DVB-S.
by: Wan, Tat-Chee
Published: (2007)
by: Wan, Tat-Chee
Published: (2007)
CDS503 Machine Learning (December 2019/ January 2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
CDS503 – Machine Learning (Pembelajaran Mesin) - February 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Image Encrytion Using Block Based Transformation Algorithm
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
CPC251 – Machine Learning & Computational Intelligence Pembelajaran Mesin & Kecerdasan Pengkomputan
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Enhanced Heterogeneous Stacked Ensemble Machine Learning Model For Detecting Nigerian Politically Motivated Cyberhate
by: Sallau, Mullah Nanlir
Published: (2023)
by: Sallau, Mullah Nanlir
Published: (2023)
Patient video compression using 3-D block transforms for telemedicine applications
by: Sriraam, N, et al.
Published: (2006)
by: Sriraam, N, et al.
Published: (2006)
Enhancement Of Login Process Multi-Server Conmmnication For Multimedia Conferencing System (Mcs) Using Distributed Lightweight Directory Access Protocol (Ldap).
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
A Bayesian approach to classify conference papers
by: Khor, , Kok-Chin, et al.
Published: (2006)
by: Khor, , Kok-Chin, et al.
Published: (2006)
Efficient NEMO Security Management Via CAPKI.
by: Tat, Kin Tan, et al.
Published: (2007)
by: Tat, Kin Tan, et al.
Published: (2007)
A New Class Of Operations To Accelerate Particle Swarm Optimization Algorithm And A Novel Hybrid Approach For Unit Commitment Problem.
by: Ting, Tiew On
Published: (2004)
by: Ting, Tiew On
Published: (2004)
CST334 – Network Monitoring & Security (Pengawasan & Keselamatan Rangkaian) CST338 – Network & Communication Security (Keselamatan Rangkaian & Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Direct sequence ultra wideband system design for wireless sensor network
by: Azim, Md. Anwarul, et al.
Published: (2008)
by: Azim, Md. Anwarul, et al.
Published: (2008)
Similar Items
-
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018) -
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005) -
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009) -
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017) -
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)