A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
Traditional cryptanalysis is typically performed using manual calculations or search- ing algorithms,which can be computationally costly and cannot produce additionalin- sights apart from what has been dictated by the cryptanalyst.
| Main Author: | Lee, Ting Rong |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/53219/ |
| Abstract | Abstract here |
Similar Items
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Enhancement Of Login Process Multi-Server Conmmnication For Multimedia Conferencing System (Mcs) Using Distributed Lightweight Directory Access Protocol (Ldap).
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Factors Influencing The Adoption Of Internet Of Things For Home Security In Dhaka Households
by: Mahmud, Arif
Published: (2023)
by: Mahmud, Arif
Published: (2023)
Enhancing Security Protocol For Voip Communication Using Modified Vector Quantization
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
Efficient Queue And Gsi Security
Management Framework For Mobile
Desktop Grid
by: Sarwar, Muhammad Imran
Published: (2008)
by: Sarwar, Muhammad Imran
Published: (2008)
Industrial Machine Allocation Using Rulebased Knowledge Representation Technique.
by: Wan Rameli, Wan Nur Akmal
Published: (2010)
by: Wan Rameli, Wan Nur Akmal
Published: (2010)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Seamsar: Seamless And Secure Handover Model For Mobile IPTV Using MIPV6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
Seamsar: Seamless And Secure Handover
Model
For Mobile Iptv Using Mipv6
by: Cornelis, Armanda Caesario
Published: (2011)
by: Cornelis, Armanda Caesario
Published: (2011)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
The Impact Of National, Organizational And Information Security Cultures Towards Zero Trust Model Adoption In Uae
by: Zyoud, Bader Husni Abdel Razzaq
Published: (2024)
by: Zyoud, Bader Husni Abdel Razzaq
Published: (2024)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
Enhanced Heterogeneous Stacked Ensemble Machine Learning Model For Detecting Nigerian Politically Motivated Cyberhate
by: Sallau, Mullah Nanlir
Published: (2023)
by: Sallau, Mullah Nanlir
Published: (2023)
Hybridization Of Optimized Support
Vector Machine And Artificial Neural
Network For The Diabetic Retinopathy
Classification Problem
by: Kader, Nur Izzati Ab
Published: (2019)
by: Kader, Nur Izzati Ab
Published: (2019)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Hybrid Machine Translation Using Malay-English Language Parallel Text Extraction From Comparable Text
by: Yeong, Yin Lai
Published: (2024)
by: Yeong, Yin Lai
Published: (2024)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
by: Abdullah, Amal Abdulaziz
Published: (2014)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
by: Abdullah, Amal Abdulaziz
Published: (2014)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
An Ontology And Constraint-based Approach For Dynamic Personalised Planning In Healthcare
by: Mahiddin , Normadiah
Published: (2009)
by: Mahiddin , Normadiah
Published: (2009)
Bounded Box-Zoning Integrated Approach For Children Handwriting Recognition
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
Multimodal Sentiment Analysis Of Social Media Through Deep Learning Approach
by: An, Jieyu
Published: (2024)
by: An, Jieyu
Published: (2024)
Genogram Visualization Using Social Network Approach For Medical Family Tree
by: Bokhare, Siti Fatimah
Published: (2018)
by: Bokhare, Siti Fatimah
Published: (2018)
Medical Image Modality Classification using Feature Weighted Clustering Approach.
by: Chandra, Bhavik Anil
Published: (2010)
by: Chandra, Bhavik Anil
Published: (2010)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Behavioural Factors Based Crowd
Evacuation Modelling Using
Fuzzy-Neural Approach
by: Zakaria, Wahida
Published: (2020)
by: Zakaria, Wahida
Published: (2020)
Multi-View Retrieval Of Software Design Specifications Using Similarity Assessment Approach
by: Adamu, Alhassan
Published: (2017)
by: Adamu, Alhassan
Published: (2017)
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
Similar Items
-
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018) -
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009) -
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009) -
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022) -
Enhancement Of Login Process Multi-Server Conmmnication For Multimedia Conferencing System (Mcs) Using Distributed Lightweight Directory Access Protocol (Ldap).
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
