{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:37Z","timestamp":1740099157474,"version":"3.37.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_1","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T12:14:23Z","timestamp":1536754463000},"page":"3-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Research of Cryptosystem Recognition Based on Randomness Test\u2019s Return Value"],"prefix":"10.1007","author":[{"given":"Zhicheng","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yaqun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Fengmei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"4","key":"1_CR1","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Labs Tech. J."},{"key":"1_CR2","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)","edition":"2"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-17881-8_23","volume":"133","author":"R Manjula","year":"2011","unstructured":"Manjula, R., Anitha, R.: Identification of encryption algorithm using decision tree. Adv. Comput. 133, 237\u2013246 (2011)","journal-title":"Adv. Comput."},{"key":"1_CR4","volume-title":"Classification of Ciphers","author":"P Maheshwari","year":"2001","unstructured":"Maheshwari, P.: Classification of Ciphers. Indian Institute of Technology, Kanpur (2001)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Chou, J.W., Lin, S.D., Cheng, C.M.: On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, pp. 105\u2013110. ACM, New York (2012)","DOI":"10.1145\/2381896.2381912"},{"issue":"4","key":"1_CR6","first-page":"146","volume":"36","author":"Y Wu","year":"2015","unstructured":"Wu, Y., Wang, T., Xing, M.: Block ciphers identification scheme based on the distribution character of randomness test values of ciphertext. J. Commun. 36(4), 146\u2013155 (2015)","journal-title":"J. Commun."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Dileep, A.D., Sekhar, C.C.: Identification of block ciphers using support vector machines. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN 2006), pp. 2696\u20132701. IEEE, Gulf Islands (2006)","DOI":"10.1109\/IJCNN.2006.247172"},{"issue":"7","key":"1_CR8","first-page":"1645","volume":"22","author":"A Rukhin","year":"2015","unstructured":"Rukhin, A., Soto, J., Nechvatal, J.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. Appl. Phys. Lett. 22(7), 1645\u20131798 (2015)","journal-title":"Appl. Phys. Lett."},{"key":"1_CR9","unstructured":"Marsaglia, G.: The Marsaglia Random Number CDROM Including the DIEHARD Battery of Tests of Randomness (1996). http:\/\/stat.fsu.edu\/pub\/diehard"},{"issue":"8","key":"1_CR10","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/0167-4048(94)90051-5","volume":"13","author":"H Gustafson","year":"1994","unstructured":"Gustafson, H., Dawson, E., Nielsen, L.: A computer package for measuring the strength of encryption algorithms. Comput. Secur. 13(8), 687\u2013697 (1994)","journal-title":"Comput. Secur."},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/BFb0032353","volume-title":"Cryptography: Policy and Algorithms","author":"HM Gustafson","year":"1996","unstructured":"Gustafson, H.M., Dawson, E.P., Goli\u0107, J.D.: Randomness measures related to subset occurrence. In: Dawson, E., Goli\u0107, J. (eds.) CPA 1995. LNCS, vol. 1029, pp. 132\u2013143. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/BFb0032353"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Lozach, F., Ben-Romdhane, M., Graba, T.: FPGA design of an open-loop true random number generator. In: Proceedings of 2013 Euromicro Conference on Digital System Design (DSD), pp. 615\u2013622. IEEE, Los Alamitos (2013)","DOI":"10.1109\/DSD.2013.73"},{"issue":"15","key":"1_CR13","first-page":"77","volume":"7","author":"A Alabaichi","year":"2013","unstructured":"Alabaichi, A., Mahmod, R., Ahmad, F.: Randomness analysis of 128 bits blowfish block cipher on ECB and CBC modes. Int. J. Digital Content Technol. Appl. 7(15), 77 (2013)","journal-title":"Int. J. Digital Content Technol. Appl."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Souza, W.A., Tomlinson, A.: A distinguishing attack with a neural network. In: Proceedings of the IEEE 13th International Conference on Data Mining Workshops (ICDMW 2013), Dallas, pp. 154\u2013161 (2013)","DOI":"10.1109\/ICDMW.2013.116"},{"key":"1_CR15","volume-title":"A Pattern Recognition Approach to Block Cipher Identification","author":"S Nagireddy","year":"2008","unstructured":"Nagireddy, S.: A Pattern Recognition Approach to Block Cipher Identification. Indian Institute of Technology, Madras (2008)"},{"issue":"04","key":"1_CR16","first-page":"42","volume":"2","author":"SO Sharif","year":"2011","unstructured":"Sharif, S.O., Mansoor, S.P.: Performance evaluation of classifiers used for identification of encryption algorithms. ACEEE Int. J. Netw. Secur. 2(04), 42\u201345 (2011)","journal-title":"ACEEE Int. J. Netw. Secur."},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Sharif, S.O., Kuncheva, L.I., Mansoor, S.P.: Classifying encryption algorithms using pattern recognition techniques. In: Proceedings of the IEEE International Conference on Information Theory and Information Security (ICITIS), Beijing, China, pp. 1168\u20131172 (2010)","DOI":"10.1109\/ICITIS.2010.5689769"},{"issue":"2","key":"1_CR18","first-page":"382","volume":"41","author":"LT Huang","year":"2018","unstructured":"Huang, L.T., Zhao, Z.C., Zhao, Y.Q.: A two-stage cryptosystem recognition scheme based on random forest. Chin. J. Comput. 41(2), 382\u2013399 (2018)","journal-title":"Chin. J. Comput."},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-540-85912-3_3","volume-title":"Sequences and Their Applications - SETA 2008","author":"M S\u00f6nmez Turan","year":"2008","unstructured":"S\u00f6nmez Turan, M., \u00c7al\u0131k, \u00c7., Saran, N.B., Do\u011fanaksoy, A.: New distinguishers based on random mappings against stream ciphers. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. LNCS, vol. 5203, pp. 30\u201341. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85912-3_3"},{"key":"1_CR20","volume-title":"Classiflcation of RSA and IDEA Ciphers","author":"MB Rao","year":"2003","unstructured":"Rao, M.B.: Classiflcation of RSA and IDEA Ciphers. Indian Institute of Technology, Kanpur (2003)"},{"key":"1_CR21","volume-title":"Caltech-256 Object Category Dataset","author":"G Griffin","year":"2007","unstructured":"Griffin, G., Holub, A., Perona, P.: Caltech-256 Object Category Dataset. California Institute of Technology, Pasadedna (2007)"},{"key":"1_CR22","volume-title":"Design and Analysis of Block Cipher","author":"W Wu","year":"2009","unstructured":"Wu, W., Feng, D., Zhang, W.: Design and Analysis of Block Cipher, 2nd edn. Tsinghua University Press, Beijing (2009)","edition":"2"},{"issue":"3","key":"1_CR23","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"2","key":"1_CR24","first-page":"125","volume":"2","author":"A Benhur","year":"2002","unstructured":"Benhur, A.: Support vector clustering. J. Mach. Learn. Res. 2(2), 125\u2013137 (2002)","journal-title":"J. Mach. Learn. Res."},{"key":"1_CR25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973000","volume-title":"Machine Learning: The Art and Science of Algorithms that Make Sense of Data","author":"P Flach","year":"2012","unstructured":"Flach, P.: Machine Learning: The Art and Science of Algorithms that Make Sense of Data. Cambridge University Press, New York (2012)"},{"issue":"20","key":"1_CR26","first-page":"145","volume":"35","author":"GD Shi","year":"2009","unstructured":"Shi, G.D., Kang, F., Gu, H.W.: Research and implementation of randomness tests. Comput. Eng. 35(20), 145\u2013146 (2009)","journal-title":"Comput. Eng."},{"issue":"4","key":"1_CR27","doi-asserted-by":"publisher","first-page":"595","DOI":"10.3724\/SP.J.1016.2009.00595","volume":"32","author":"H Chen","year":"2009","unstructured":"Chen, H., Feng, D.G., Fan, L.M.: A new statistical test on block ciphers. Chin. J. Comput. 32(4), 595\u2013601 (2009)","journal-title":"Chin. J. Comput."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T23:49:50Z","timestamp":1571874590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}