[1] DILEEP A D,SEKHAR C C.Identification of block ciphers using support vector machines[C]//Proceedings of International Joint Conference on Neural Networks.Washington D.C.,USA:IEEE Press,2006:2696-2701. [2] SOUZA W A R,TOMLINSON A.A distinguishing attack with a neural network[C]//Proceedings of IEEE International Conference on Data Mining Workshops.Washington D.C.,USA:IEEE Press,20l3:154-161. [3] WU Yang,WANG Tao,XING Meng,et al.Block ciphers identification scheme based on the distribution character of randomness test values of ciphertext[J].Chinese Journal on Communications,2015,36(4):146-155.(in Chinese)吴杨,王韬,邢萌,等.基于密文随机性度量值分布特征的分组密码算法识别方案[J].通信学报,2015,36(4):146-155. [4] HUANG Liangtao,ZHAO Zhicheng,ZHAO Yaqun.A two-stage cryptosystem recognition scheme based on random forest[J].Chinese Journal of Computers,2018,41(2):382-399.(in Chinese)黄良韬,赵志诚,赵亚群.基于随机森林的密码体制分层识别方案[J].计算机学报,2018,41(2):382-399. [5] MANJULA R,ANITHA R.Identification of encryption algorithm using decision tree[C]//Proceedings of International Conference on Computer Science and Information Technology.Berlin,Germany:Springer,2011:237-246. [6] MISHRA S,BHATTACHARJYA A.Pattern analysis of cipher text:a combined approach[C]//Proceedings of 2013 International Conference on Recent Trends in Information Technology.Washington D.C.,USA:IEEE Press,2013:393-398. [7] ZHAO Zhicheng,ZHAO Yaqun,LIU Fengmei.Scheme of block ciphers recognition based on randomness test[J].Journal of Cryptologic Research,2019,6(2):177-190.(in Chinese)赵志诚,赵亚群,刘凤梅.基于随机性测试的分组密码体制识别方案[J].密码学报,2019,6(2):177-190. [8] LOMTE V M,SHINDE A D.Review of a new distinguishing attack using block cipher with a neural network[J].International Journal of Science and Research,2014,3(8):733-736. [9] AL-JANABI S,AL-KHATEEB B,ABD A J.Intelligent techniques in cryptanalysis:review and future directions[J].UHD Journal of Science and Technology,2017,1(1):1-9. [10] SHARIF S O,MANSOOR S P.Performance evaluation of classifiers used for identification of encryption algorithms[J].International Journal on Network Security,2011,2(4):42-45. [11] SHARIF S O,KUNCHEVA L I,MANSOOR S P.Classifying encryption algorithms using pattern recognition techniques[C]//Proceedings of 2010 IEEE International Conference on Information Theory and Information Security.Washington D.C.,USA:IEEE Press,2010:1168-1172. [12] MELLO F L,XEXÉO J A M.Identifying encryption algorithms in ECB and CBC modes using computational intelligence[J].Journal of Universal Computer Science,2018,24(1):25-42. [13] TAN Cheng,DENG Xiaoyan,ZHANG Lijun.Identification of block ciphers under CBC mode[J].Procedia Computer Science,2018,131:65-71. [14] XUE Xiaona,GAO Shuping,PENG Hongming,et al.Density peaks clustering algorithm based on K-nearest neighbors and classes-merging[J].Journal of Jilin University(Science Edition),2019,57(1):111-120.(in Chinese) 薛小娜,高淑萍,彭弘铭,等.基于K近邻和多类合并的密度峰值聚类算法[J].吉林大学学报(理学版),2019,57(1):111-120. [15] LIU Jiamei,XU Qiaozhi.Network traffic prediction and deployment strategy based on machine learning for SDN[J].Computer Engineering,2020,46(10):223-230.(in Chinese)刘佳美,徐巧枝.基于机器学习的SDN网络流量预测与部署策略[J].计算机工程,2020,46(10):223-230. [16] RUKHIN A,SOTO J,NECHVATAL J,et al.A statistical test suite for random and pseudorandom number generators for cryptographic applications:Sp 800-22 rev.1a[R].Gaithersburg,USA:Booz-Allen and Hamilton Inc.,2001. [17] SPOLAOR N,CHERMAN E A,MONARD M C,et al.Relief for multi-label feature selection[C]//Proceedings of 2013 Brazilian Conference on Intelligent Systems.Washington D.C.,USA:IEEE Press,2014:6-11. [18] ZHOU Zhihua.Ensemble methods:foundations and algorithms[M].[S.l.]:Chapman and Hall/CRC,2012. [19] STINSON D R.Cryptography theory and practice[M].Translated by FENG Dengguo.3rd edition.Beijing:Publishing House of Electronics Industry,2016.(in Chinese) STINSON D R.密码学原理与实践[M].冯登国,译.3版.北京:电子工业出版社,2016. [20] KATZ J,LINDELL Y.Introduction to modern cryptogarphy:principles and protocols[M].Translated by REN Wei.Beijing:National Defense Industry Press,2011.(in Chinese) KATZ J,LINDELL Y.现代密码学:原理与协议[M].任伟,译.北京:国防工业出版社,2011. [21] WU Wenling,FENG Dengguo,ZHANG Wentao.Design and analysis of block cipher[M].Beijing:Tsinghua University Press,2009.(in Chinese)吴文玲,冯登国,张文涛.分组密码的设计与分析[M].北京:清华大学出版社,2009. |