{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T22:56:52Z","timestamp":1776898612456,"version":"3.51.2"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811557873","type":"print"},{"value":"9789811557880","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5788-0_74","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:02:45Z","timestamp":1599552165000},"page":"785-793","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Cryptographic Algorithm Identification Using Deep Learning Techniques"],"prefix":"10.1007","author":[{"given":"Sandeep","family":"Pamidiparthi","sequence":"first","affiliation":[]},{"given":"Sirisha","family":"Velampalli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"74_CR1","unstructured":"Stallings, W.: Network Security Essentials: Applications and Standards, 4th edn. Pearson Education, India (2003)"},{"key":"74_CR2","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, New York (2007)"},{"key":"74_CR3","doi-asserted-by":"crossref","unstructured":"Begum, A., Fatima, F., Sabahath, A.: Implementation of deep learning algorithm with perceptron using TenzorFlow library. In: 2019 International Conference on Communication and Signal Processing (ICCSP). IEEE (2019)","DOI":"10.1109\/ICCSP.2019.8697910"},{"issue":"1","key":"74_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.17648\/enig.v3i1.55","volume":"3","author":"F Barbosa","year":"2016","unstructured":"Barbosa, F., Vidal, A., Mello, F.: Machine learning for cryptographic algorithm identification. J. Inf. Secur. Cryptogr. (Enigma) 3(1), 3\u20138 (2016)","journal-title":"J. Inf. Secur. Cryptogr. (Enigma)"},{"issue":"4","key":"74_CR5","first-page":"289","volume":"9","author":"R Bhanot","year":"2015","unstructured":"Bhanot, R., Hans, R.: A review and comparative analysis of various encryption algorithms. Int. J. Secur. Appl. 9(4), 289\u2013306 (2015)","journal-title":"Int. J. Secur. Appl."},{"key":"74_CR6","unstructured":"Elminaam, D.S.A., Abdual-Kader, H.M., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms. IJ Netw. Secur. 10(3), 216\u2013222 (2010)"},{"issue":"4","key":"74_CR7","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1023\/B:CASA.0000003504.91987.d9","volume":"39","author":"IN Kovalenko","year":"2003","unstructured":"Kovalenko, I.N., Kochubinskii, A.I.: Asymmetric cryptographic algorithms. Cybern. Syst. Anal. 39(4), 549\u2013554 (2003)","journal-title":"Cybern. Syst. Anal."},{"key":"74_CR8","doi-asserted-by":"crossref","unstructured":"Paul, G., Maitra, S.: RC4 Stream Cipher and Its Variants. CRC Press, Boca Raton (2011)","DOI":"10.1201\/b11310"},{"key":"74_CR9","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J.: The Salsa20 family of stream ciphers. New Stream Cipher Designs, pp. 84\u201397. Springer, Berlin, Heidelberg (2008)","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"74_CR10","unstructured":"Becker, M., Desoky, A.: A study of the DVD content scrambling system (CSS) algorithm. In: Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, 2004. IEEE (2004)"},{"key":"74_CR11","unstructured":"Grabbe, J.O.: The DES Algorithm Illustrated (2010)"},{"key":"74_CR12","unstructured":"Mahajan, P., Sachdeva, A.: A study of encryption algorithms AES, DES and RSA for security. Global J. Comput. Sci. Technol. (2013)"},{"key":"74_CR13","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication (1996)","DOI":"10.1145\/238168.238182"},{"key":"74_CR14","unstructured":"Wang, X., et al.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. IACR Cryptology ePrint Archive 2004, 199 (2004)"},{"key":"74_CR15","unstructured":"Reimo, A.S.F.V.: Analysis of encrypted file blocks to obtain the algorithm. Federal University of Rio de Janeiro, Graduation Project (2015)"},{"issue":"6","key":"74_CR16","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MSP.2018.2842646","volume":"35","author":"Rafael C Gonzalez","year":"2018","unstructured":"Gonzalez, Rafael C.: Deep convolutional neural networks [Lecture Notes]. IEEE Signal Process. Mag. 35(6), 79\u201387 (2018)","journal-title":"IEEE Signal Process. Mag."},{"key":"74_CR17","unstructured":"Rennie, J.D., et al.: Tackling the poor assumptions of Naive Bayes text classifiers. In: Proceedings of the 20th International Conference on Machine Learning (ICML-03) (2003)"},{"key":"74_CR18","unstructured":"Boureau, Y.-L., Ponce, J., LeCun, Y.: A theoretical analysis of feature pooling in visual recognition. In: Proceedings of the 27th International Conference on Machine Learning (ICML-10) (2010)"},{"key":"74_CR19","unstructured":"Srivastava, N., et al.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929\u20131958 (2014)"},{"key":"74_CR20","unstructured":"Bengio, Y., et al.: A neural probabilistic language model. J. Mach. Learn. Res. 3, 1137\u20131155 (2003)"},{"key":"74_CR21","unstructured":"Collobert, R., et al.: Natural language processing (almost) from scratch. J. Mach. Learn. Res. 12, 2493\u20132537 (2011)"},{"key":"74_CR22","doi-asserted-by":"crossref","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","DOI":"10.1038\/nature14539"},{"key":"74_CR23","doi-asserted-by":"crossref","unstructured":"Kambhatla, N.: Decipherment of substitution ciphers with neural language models. Diss. Applied Sciences, School of Computing Science (2018)","DOI":"10.18653\/v1\/D18-1102"},{"key":"74_CR24","doi-asserted-by":"crossref","unstructured":"Wang, W., et al.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"74_CR25","unstructured":"Lecun, Y.: Une Procedure dapprentissage pour reseau a seuil assymetrique cog\u2019nitiva 85: A la Frontiere de lqIntelligence Artificielle des Sciences de la Connais\u2019 sance des Neurosciences. France, Paris (1985)"},{"key":"74_CR26","doi-asserted-by":"crossref","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533\u2013536 (1986)","DOI":"10.1038\/323533a0"},{"issue":"1","key":"74_CR27","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/S0169-7439(97)00061-0","volume":"39","author":"D Svozil","year":"1997","unstructured":"Svozil, D., Kvasnicka, V., Pospichal, J.: Introduction to multi-layer feed-forward neural networks. Chemom. Intell. Lab. Syst. 39(1), 43\u201362 (1997)","journal-title":"Chemom. Intell. Lab. Syst."},{"issue":"8","key":"74_CR28","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"74_CR29","unstructured":"Zhang, X., LeCun, Y.: Text understanding from scratch. arXiv preprint \narXiv:1502.01710\n\n (2015)"},{"key":"74_CR30","unstructured":"Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) (2016)"},{"key":"74_CR31","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5788-0_74","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:17:01Z","timestamp":1599553021000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5788-0_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9789811557873","9789811557880"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5788-0_74","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}