咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 8 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 1 篇 信息与通信工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 9 篇 cryptographic al...
  • 4 篇 machine learning
  • 2 篇 ensemble learnin...
  • 2 篇 svm classifier
  • 2 篇 data mining
  • 2 篇 identification s...
  • 2 篇 machine intellig...
  • 1 篇 random forest al...
  • 1 篇 random forest
  • 1 篇 cryptographic sy...
  • 1 篇 binary code summ...
  • 1 篇 single-layer ide...
  • 1 篇 logistic regress...
  • 1 篇 large language m...
  • 1 篇 cryptanalysis
  • 1 篇 parallel computi...
  • 1 篇 security assessm...
  • 1 篇 hybrid random fo...
  • 1 篇 binary code simi...
  • 1 篇 randomness test

机构

  • 4 篇 henan univ sch c...
  • 4 篇 nankai univ coll...
  • 2 篇 univ macao fac s...
  • 2 篇 henan univ henan...
  • 2 篇 henan univ henan...
  • 1 篇 university of sc...
  • 1 篇 chinese acad sci...
  • 1 篇 henan rural cred...
  • 1 篇 sci & technol co...
  • 1 篇 ibm brazil sao p...
  • 1 篇 science and tech...
  • 1 篇 mil inst engn im...
  • 1 篇 university of sc...
  • 1 篇 henan yinzhu sec...
  • 1 篇 tongren univ sch...
  • 1 篇 qi-anxin technol...
  • 1 篇 fed univ rio de ...
  • 1 篇 henan univ int e...
  • 1 篇 univ fed rio de ...
  • 1 篇 univ fed rio de ...

作者

  • 4 篇 yuan ke
  • 4 篇 jia chunfu
  • 3 篇 li jiabao
  • 2 篇 du zhanfei
  • 2 篇 yu daoming
  • 2 篇 huang yabing
  • 2 篇 de mello f. l.
  • 1 篇 feng jingkai
  • 1 篇 cheng tan
  • 1 篇 shaoyin cheng
  • 1 篇 xexeo j. a. m.
  • 1 篇 shikai guo
  • 1 篇 sun hanlin
  • 1 篇 guoqiang chen
  • 1 篇 nenghai yu
  • 1 篇 vidal a. r. s. f...
  • 1 篇 yang longwei
  • 1 篇 qingbing ji
  • 1 篇 yanming zhang
  • 1 篇 tan cheng

语言

  • 7 篇 英文
  • 2 篇 其他
检索条件"主题词=Cryptographic Algorithm Identification"
9 条 记 录,以下是1-10 订阅
排序:
A generic cryptographic algorithm identification scheme based on ciphertext features
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2025年 89卷
作者: Li, Jiabao Sun, Hanlin Du, Zhanfei Wang, Yaxuan Yuan, Ke Jia, Chunfu Henan Univ Sch Comp & Informat Engn Kaifeng 475004 Peoples R China Univ Macao Fac Sci & Technol Macau 519000 Peoples R China Chinese Acad Sci Inst Informat Engn Beijing 100093 Peoples R China Henan Univ Henan Prov Engn Res Ctr Spatial Informat Proc Kaifeng 475004 Peoples R China Nankai Univ Coll Cybersecur Tianjin 300350 Peoples R China
To assist relevant agencies in conducting security assessments of commercial cryptographic applications or establishing security monitoring and early warning mechanisms for cryptographic system, this paper proposes a ... 详细信息
来源: 评论
cryptographic algorithm identification Using Machine Learning and Massive Processing
收藏 引用
IEEE LATIN AMERICA TRANSACTIONS 2016年 第11期14卷 4585-4590页
作者: de Mello, F. L. Xexeo, J. A. M. Fed Univ Rio de Janeiro UFRJ Polytech Sch Rio De Janeiro Brazil Mil Inst Engn IME Rio De Janeiro Brazil
This paper presents a study on encryption algorithms identification by means of machine learning techniques. Plain text files, written in seven different languages, were encoded by seven cryptographic algorithm under ... 详细信息
来源: 评论
A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model
收藏 引用
COMPLEX & INTELLIGENT SYSTEMS 2024年 第1期10卷 1131-1147页
作者: Yuan, Ke Huang, Yabing Du, Zhanfei Li, Jiabao Jia, Chunfu Henan Univ Sch Comp & Informat Engn Kaifeng 475004 Peoples R China Henan Univ Henan Prov Engn Res Ctr Spatial Informat Proc Kaifeng 475004 Peoples R China Henan Rural Credit Union Zhengzhou 450018 Peoples R China Univ Macao Fac Sci & Technol Macau 519000 Peoples R China Henan Yinzhu Secur Technol Zhengzhou 450003 Peoples R China Nankai Univ Coll Cybersecur Tianjin 300350 Peoples R China
cryptographic technology can effectively defend against malicious attackers to attack sensitive and private information. The core of cryptographic technology is cryptographic algorithm, and the cryptographic algorithm... 详细信息
来源: 评论
Machine Learning Applied to the Recognition of cryptographic algorithms Used for Multimedia Encryption
收藏 引用
IEEE LATIN AMERICA TRANSACTIONS 2017年 第7期15卷 1301-1305页
作者: Barbosa, Flavio Mendonca Vidal, A. R. S. F. Almeida, H. L. S. de Mello, F. L. IBM Brazil Sao Paulo Brazil Univ Fed Rio de Janeiro Dept Engn Eletron & Comp Escola Politecn Rio de Janeiro Brazil Univ Fed Rio de Janeiro Polytech Sch Elect & Comp Dept Rio De Janeiro Brazil
This paper presents a study of encrypted multimedia files in order to identify the encryption algorithm. Audio and video files were encoded with distinct cryptographic algorithms and then metadata were extracted from ... 详细信息
来源: 评论
An Approach to Identifying cryptographic algorithm from Ciphertext  8
An Approach to Identifying Cryptographic Algorithm from Ciph...
收藏 引用
8th IEEE International Conference on Communication Software and Networks (ICCSN)
作者: Tan, Cheng Ji, Qingbing Sci & Technol Commun Secur Lab Chengdu Sichuan Provinc Peoples R China
cryptographic algorithm plays a significant role in a cryptosystem, which protects those sensitive and private data from been obtained by some malicious attackers. Actually, the details about the cryptographic algorit... 详细信息
来源: 评论
A Block Cipher algorithm identification Scheme Based on Hybrid Random Forest and Logistic Regression Model
收藏 引用
NEURAL PROCESSING LETTERS 2023年 第3期55卷 3185-3203页
作者: Yuan, Ke Huang, Yabing Li, Jiabao Jia, Chunfu Yu, Daoming Henan Univ Sch Comp & Informat Engn Kaifeng 475004 Peoples R China Henan Univ Henan Key Lab Big Data Anal & Proc Kaifeng 475004 Peoples R China Nankai Univ Coll Cybersecur Tianjin 300350 Peoples R China
cryptographic algorithm identification is aimed to analyze the potential feature information in ciphertext data when the ciphertext is known, which belongs to the category of cryptanalysis. This paper takes block ciph... 详细信息
来源: 评论
An Approach to Identifying cryptographic algorithm from Ciphertext
An Approach to Identifying Cryptographic Algorithm from Ciph...
收藏 引用
2016 8th IEEE International Conference on Communication Software and Networks(ICCSN 2016)
作者: Cheng Tan Qingbing Ji Science and Technology on Communication Security Laboratory
cryptographic algorithm plays a significant role in a cryptosystem,which protects those sensitive and private data from been obtained by some malicious ***,the details about the cryptographic algorithm applied in a cr... 详细信息
来源: 评论
A block cipher algorithm identification scheme based on hybrid k-nearest neighbor and random forest algorithm
收藏 引用
PEERJ COMPUTER SCIENCE 2022年 8卷 e1110页
作者: Yuan, Ke Yu, Daoming Feng, Jingkai Yang, Longwei Jia, Chunfu Huang, Yiwang Henan Univ Sch Comp & Informat Engn Kaifeng Henan Peoples R China Henan Univ Henan Key Lab Big Data Anal & Proc Kaifeng Henan Peoples R China Henan Univ Int Educ Coll Zhengzhou Henan Peoples R China Nankai Univ Coll Cybersecur Tianjin Peoples R China Tongren Univ Sch Data Sci Tongren Guizhou Peoples R China
cryptographic algorithm identification, which refers to analyzing and identifying the encryption algorithm used in cryptographic system, is of great significance to cryptanalysis. In order to improve the accuracy of i... 详细信息
来源: 评论
FoC: Figure out the cryptographic Functions in Stripped Binaries with LLMs
收藏 引用
ACM Transactions on Software Engineering and Methodology 1000年
作者: Xiuwei Shang Guoqiang Chen Shaoyin Cheng Shikai Guo Yanming Zhang Weiming Zhang Nenghai Yu University of Science and Technology of China Hefei China QI-ANXIN Technology Research Institute Beijing China University of Science and Technology of China Anhui Province Key Laboratory of Digital Security Hefei China Dalian Maritime University The Dalian Key Laboratory of Artificial Intelligence Dalian China
Analyzing the behavior of cryptographic functions in stripped binaries is a challenging but essential task, which is crucial in software security fields such as malware analysis and legacy code inspection. However, th... 详细信息
来源: 评论