1 |
丁伟, 谈程. 一种基于密文分析的密码识别技术. 通信技术, 2016, 49(10): 1382- 1386.
doi: 10.3969/j.issn.1002-0802.2016.10.022
|
|
DING W, TAN C. An approach of identifying cipher based on ciphertext analysis. Communications Technology, 2016, 49(10): 1382- 1386.
doi: 10.3969/j.issn.1002-0802.2016.10.022
|
2 |
李继中, 舒辉. 密码算法识别技术研究. 信息网络安全, 2011,(11): 46- 49.
URL
|
|
LI J Z, SHU H. The research of crypto algorithm recognition technology. Netinfo Security, 2011,(11): 46- 49.
URL
|
3 |
Information Technology Laboratory. A statistical test suite for random and pseudorandom number generators for cryptographic applications: SP800-22 Rev. 1a—2010[S]. Washington D. C., USA: National Institute of Standards and Technology, 2010.
|
4 |
陈华, 冯登国, 范丽敏. 一种关于分组密码的新的统计检测方法. 计算机学报, 2009, 32(4): 595- 601.
URL
|
|
CHEN H, FENG D G, FAN L M. A new statistical test on block ciphers. Chinese Journal of Computers, 2009, 32(4): 595- 601.
URL
|
5 |
黄良韬, 赵志诚, 赵亚群. 基于随机森林的密码体制分层识别方案. 计算机学报, 2018, 41(2): 382- 399.
URL
|
|
HUANG L T, ZHAO Z C, ZHAO Y Q. A two-stage cryptosystem recognition scheme based on random forest. Chinese Journal of Computers, 2018, 41(2): 382- 399.
URL
|
6 |
王旭, 陈永乐, 王庆生, 等. 结合特征选择与集成学习的密码体制识别方案. 计算机工程, 2021, 47(1): 139-145, 153.
URL
|
|
WANG X, CHEN Y L, WANG Q S, et al. Cryptosystem identification scheme combining feature selection and ensemble learning. Computer Engineering, 2021, 47(1): 139-145, 153.
URL
|
7 |
|
8 |
DE SOUZA W A R, TOMLINSON A. A distinguishing attack with a neural network[C]//Proceedings of the 13th International Conference on Data Mining. Washington D. C., USA: IEEE Press, 2014: 154-161.
|
9 |
YUAN C X. Cryptosystem recognition scheme based on convolution features[C]//Proceedings of International Conference on Artificial Intelligence, Big Data and Algorithms. Washington D. C., USA: IEEE Press, 2021: 229-232.
|
10 |
曹莉茹. 基于深度学习的密码算法识别研究[D]. 成都: 电子科技大学, 2021.
|
|
CAO L R. Research on cryptographic algorithm recognition based on deep learning[D]. Chengdu: University of Electronic Science and Technology of China, 2021. (in Chinese)
|
11 |
STALLINGS W. 密码编码学与网络安全——原理与实践[M]. 孟庆树, 译. 北京: 电子工业出版社, 2006.
|
|
STALLINGS W. Cryptography and network security: principles and practices[M]. MENG Q S, translated. Beijing: Publishing House of Electronics Industry, 2006. (in Chinese)
|
12 |
纪文桃, 李媛媛, 秦宝东. 基于决策树的SM4分组密码工作模式识别. 计算机工程, 2021, 47(8): 157-161, 169.
URL
|
|
JI W T, LI Y Y, QIN B D. Working mode recognition for SM4 block cipher based on decision tree. Computer Engineering, 2021, 47(8): 157-161, 169.
URL
|
13 |
HUANG J, WEI Y Q, YI J, et al. An improved kNN based on class contribution and feature weighting[C]//Proceedings of the 10th International Conference on Measuring Technology and Mechatronics Automation. Washington D. C., USA: IEEE Press, 2018: 313-316.
|
14 |
郭帅, 程光. TLS密码套件的流量数据随机性分析. 北京航空航天大学学报, 2022, 48(2): 291- 300.
URL
|
|
GUO S, CHENG G. Randomness of traffic data in TLS cipher suite. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(2): 291- 300.
URL
|
15 |
GUO Q, KE Z H, WANG S Y, et al. Persistent fault analysis against SM4 implementations in libraries Crypto++ and GMSSL. IEEE Access, 2021, 9, 63636- 63645.
|
16 |
吴杨, 王韬, 李进东. 分组密码算法密文的统计检测新方法研究. 军械工程学院学报, 2015, 27(3): 58- 64.
URL
|
|
WU Y, WANG T, LI J D. Research on new statistical and testing method for ciphertexts of block cipher. Journal of Ordnance Engineering College, 2015, 27(3): 58- 64.
URL
|
17 |
|
18 |
WANG W, ZHU M, ZENG X W, et al. Malware traffic classification using convolutional neural network for representation learning[C]//Proceedings of International Conference on Information Networking. Washington D. C., USA: IEEE Press, 2017: 712-717.
|
19 |
|
20 |
YU H S, YANG Z G, TAN L, et al. Methods and datasets on semantic segmentation: a review. Neurocomputing, 2018, 304, 82- 103.
|
21 |
李永清, 李木舟, 付勇, 等. Raindrop: 面向硬件设计的分组密码算法. 密码学报, 2019, 6(6): 803- 814.
URL
|
|
LI Y Q, LI M Z, FU Y, et al. Raindrop: a block cipher designed for hardware. Journal of Cryptologic Research, 2019, 6(6): 803- 814.
URL
|
22 |
陈师尧, 樊燕红, 付勇, 等. ANT系列分组密码算法. 密码学报, 2019, 6(6): 748- 759.
URL
|
|
CHEN S Y, FAN Y H, FU Y, et al. On the design of ANT family block ciphers. Journal of Cryptologic Research, 2019, 6(6): 748- 759.
URL
|
23 |
夏锐琪, 任炯炯, 陈少真. 基于特征分布函数的分组密码算法差异性分析. 信息工程大学学报, 2022, 23(3): 359-365, 372.
URL
|
|
XIA R Q, REN J J, CHEN S Z. Difference analysis of block cipher algorithm based on feature distribution function. Journal of Information Engineering University, 2022, 23(3): 359-365, 372.
URL
|
24 |
夏锐琪, 李曼曼, 陈少真. 基于机器学习的分组密码结构识别. 网络与信息安全学报, 2023, 9(3): 79- 89.
URL
|
|
XIA R Q, LI M M, CHEN S Z. Identification on the structures of block ciphers using machine learning. Chinese Journal of Network and Information Security, 2023, 9(3): 79- 89.
URL
|
25 |
曾勇, 吴正远, 董丽华, 等. 加密流量中的恶意流量识别技术. 西安电子科技大学学报, 2021, 48(3): 170- 187.
URL
|
|
ZENG Y, WU Z Y, DONG L H, et al. Research on malicious traffic identification technology in encrypted traffic. Journal of Xidian University, 2021, 48(3): 170- 187.
URL
|