Author:
Sikdar Subinoy,Kule Malay
Publisher
Springer Nature Singapore
Reference20 articles.
1. Stallings W Cryptography and network security: principles and practice, Pearson
2. Forouzan BA (2007) Cryptography and network security. Tata McGraw-Hill, New Delhi
3. Khan AN, Yu Fan M, Malik A, Husain MA (2019) Cryptanalyzing Merkle-Hellman public key cryptosystem with artificial neural networks. In: 2019 IEEE 5th International conference for convergence in technology (I2CT), pp 1–7
4. Ahmadzadeh E, Kim H, Jeong O, Kim N, Moon I (2022) A deep bidirectional LSTM-GRU network model for automated ciphertext classification. IEEE Access 10:3228–3237
5. Abd AJ, Al-Janabi S (2019) Classification and identification of classical cipher type using artificial neural networks. J Eng Appl Sci 14(11):3549–3556