{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:29:48Z","timestamp":1757618988902,"version":"3.44.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T00:00:00Z","timestamp":1752710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T00:00:00Z","timestamp":1752710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972073, 61972215,62172238"],"award-info":[{"award-number":["61972073, 61972215,62172238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"crossref","award":["2018YFA0704703"],"award-info":[{"award-number":["2018YFA0704703"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Fundamental Research Funds for the Central Universities of China, Natural Science Foundation of Tianjin","award":["20JCZDJC00640"],"award-info":[{"award-number":["20JCZDJC00640"]}]},{"name":"Basic Higher Educational Key Scientific Research Program of Henan Province","award":["22A413004"],"award-info":[{"award-number":["22A413004"]}]},{"name":"Key Specialized Research and Development Program of Henan Province","award":["222102210062"],"award-info":[{"award-number":["222102210062"]}]},{"name":"Innovation Training Program for College Students of Henan province","award":["202310475175"],"award-info":[{"award-number":["202310475175"]}]},{"name":"Henan Province Science Foundation of Young Scholars","award":["242300420678"],"award-info":[{"award-number":["242300420678"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s40747-025-02014-4","type":"journal-article","created":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T15:50:04Z","timestamp":1752767404000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["RSA modulus length regression prediction based on the Run Test and machine learning in the ciphertext-only scenarios"],"prefix":"10.1007","volume":"11","author":[{"given":"Ke","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Chenmeng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Longwei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hanlin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Sufang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chunfu","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,17]]},"reference":[{"issue":"4","key":"2014_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3355048","volume":"28","author":"C Tian","year":"2019","unstructured":"Tian C, Chen C, Duan Z et al (2019) Differential testing of certificate validation in SSL\/TLS implementations: an RFC-guided approach. ACM Trans Softw Eng Methodol (TOSEM) 28(4):1\u201337","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"2014_CR2","unstructured":"\u010celeda P, Velan P, Kr\u00e1l B et\u00a0al (2019) Enabling SSH protocol visibility in flow monitoring. In: 2019 IFIP\/IEEE symposium on integrated network and service management (IM). IEEE, pp 569\u2013574"},{"key":"2014_CR3","first-page":"1","volume":"2007","author":"M Blumenthal","year":"2007","unstructured":"Blumenthal M (2007) Encryption: strengths and weaknesses of public-key cryptography. CSRS 2007:1","journal-title":"CSRS"},{"issue":"9","key":"2014_CR4","first-page":"3841","volume":"14","author":"K Somsuk","year":"2020","unstructured":"Somsuk K (2020) The new weakness of RSA and the algorithm to solve this problem. KSII Trans Internet Inf Syst (TIIS) 14(9):3841\u20133857","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"key":"2014_CR5","unstructured":"Hu Y (2010) Research and implementation of RSA algorithm. PhD thesis, Beijing University of Posts and Telecommunications"},{"key":"2014_CR6","first-page":"57","volume":"800","author":"E Barker","year":"2009","unstructured":"Barker E, Burr W, Jones A et al (2009) Recommendation for key management part 3: application-specific key management guidance. NIST Spec Publ 800:57","journal-title":"NIST Spec Publ"},{"key":"2014_CR7","first-page":"215","volume":"8","author":"ZC Ge","year":"2021","unstructured":"Ge ZC, Hu HP (2021) Confluence of neural networks and cryptography research. J Cryptologic Res 8:215\u2013231","journal-title":"J Cryptologic Res"},{"issue":"10","key":"2014_CR8","doi-asserted-by":"publisher","first-page":"3473","DOI":"10.1002\/acs.3885","volume":"38","author":"Z Peng","year":"2024","unstructured":"Peng Z (2024) Spatiotemporal fault estimation for switched nonlinear reaction-diffusion systems via adaptive iterative learning. Int J Adapt Control Signal Process 38(10):3473\u20133483","journal-title":"Int J Adapt Control Signal Process"},{"key":"2014_CR9","volume-title":"Classification of ciphers","author":"P Maheshwari","year":"2001","unstructured":"Maheshwari P (2001) Classification of ciphers. Indian Institute of Technology, Kanpur"},{"key":"2014_CR10","unstructured":"LI HC (2018) Cipher-text features based cipher system recognition. PhD thesis, Xidian University"},{"issue":"2","key":"2014_CR11","first-page":"177","volume":"6","author":"ZC Zhao","year":"2018","unstructured":"Zhao ZC, Zhao YQ, Liu FM (2018) Scheme of block ciphers recognition based on randomness test. J Cryptol Res 6(2):177\u2013190","journal-title":"J Cryptol Res"},{"key":"2014_CR12","unstructured":"Cao LR (2021) A research of cryptographic algorithm recognition scheme based on machine learning. PhD thesis, University of Electronic Science and technology"},{"issue":"2","key":"2014_CR13","first-page":"382","volume":"41","author":"L Huang","year":"2018","unstructured":"Huang L, Zhao Z, Zhao YQ (2018) A two-stage cryptosystem recognition scheme based on random forest. Chin J Comput 41(2):382\u2013399","journal-title":"Chin J Comput"},{"key":"2014_CR14","unstructured":"Hosfelt DD (2015) Automated detection and classification of cryptographic algorithms in binary programs through machine learning. arXiv preprint arXiv:1503.01186"},{"key":"2014_CR15","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J et al (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications, vol 22. US Department of Commerce, National Institute of","DOI":"10.6028\/NIST.SP.800-22"},{"key":"2014_CR16","doi-asserted-by":"crossref","unstructured":"Mengdi Z, Xiaojuan Z, Yayun Z et al (2021) Overview of randomness test on cryptographic algorithms. J Phys Conf Ser IOP Publ 1861:012009","DOI":"10.1088\/1742-6596\/1861\/1\/012009"},{"key":"2014_CR17","volume-title":"Classification and regression trees","author":"L Brieman","year":"1984","unstructured":"Brieman L, Friedman J, Olshen R et al (1984) Classification and regression trees. Wadsworth, Belmont"},{"key":"2014_CR18","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1022607123649","volume":"19","author":"CE Brodley","year":"1995","unstructured":"Brodley CE, Utgoff PE (1995) Multivariate decision trees. Mach Learn 19:45\u201376","journal-title":"Mach Learn"},{"key":"2014_CR19","doi-asserted-by":"publisher","first-page":"55999","DOI":"10.1109\/ACCESS.2021.3070575","volume":"9","author":"H Luo","year":"2021","unstructured":"Luo H, Cheng F, Yu H et al (2021) SDTR: soft decision tree regressor for tabular data. IEEE Access 9:55999\u201356011","journal-title":"IEEE Access"},{"issue":"1","key":"2014_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33640\/2405-609X.3197","volume":"8","author":"RM Aziz","year":"2022","unstructured":"Aziz RM, Hussain A, Sharma P et al (2022) Machine learning-based soft computing regression analysis approach for crime data prediction. Karbala Int J Mod Sci 8(1):1\u201319","journal-title":"Karbala Int J Mod Sci"},{"key":"2014_CR21","doi-asserted-by":"crossref","unstructured":"Freund Y, Schapire RE (1995) A decision-theoretic generalization of on-line learning and an application to boosting. In: European conference on computational learning theory. Springer, Berlin, pp 23\u201337","DOI":"10.1007\/3-540-59119-2_166"},{"key":"2014_CR22","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.ins.2021.03.042","volume":"563","author":"W Wang","year":"2021","unstructured":"Wang W, Sun D (2021) The improved adaboost algorithms for imbalanced data classification. Inf Sci 563:358\u2013374","journal-title":"Inf Sci"},{"key":"2014_CR23","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/13811.001.0001","volume-title":"Machine learning","author":"E Alpaydin","year":"2021","unstructured":"Alpaydin E (2021) Machine learning. MIT Press, Cambridge"},{"key":"2014_CR24","doi-asserted-by":"publisher","first-page":"103770","DOI":"10.1016\/j.engappai.2020.103770","volume":"94","author":"A Shahraki","year":"2020","unstructured":"Shahraki A, Abbasi M, Haugen \u00d8 (2020) Boosting algorithms for network intrusion detection: a comparative evaluation of real adaboost, gentle adaboost and modest adaboost. Eng Appl Artif Intell 94:103770","journal-title":"Eng Appl Artif Intell"},{"key":"2014_CR25","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.neucom.2020.03.064","volume":"404","author":"A Taherkhani","year":"2020","unstructured":"Taherkhani A, Cosma G, McGinnity TM (2020) Adaboost-CNN: an adaptive boosting algorithm for convolutional neural networks to classify multi-class imbalanced datasets using transfer learning. Neurocomputing 404:351\u2013366","journal-title":"Neurocomputing"},{"issue":"10","key":"2014_CR26","doi-asserted-by":"publisher","first-page":"4663","DOI":"10.1109\/TKDE.2021.3049250","volume":"34","author":"S Zhang","year":"2021","unstructured":"Zhang S (2021) Challenges in KNN classification. IEEE Trans Knowl Data Eng 34(10):4663\u20134675","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"04","key":"2014_CR27","doi-asserted-by":"publisher","first-page":"2250061","DOI":"10.1142\/S0219649222500617","volume":"21","author":"H Limam","year":"2022","unstructured":"Limam H, Zouhair A, Oueslati W (2022) A new hybrid multiclass approach based on KNN and SVM. J Inf Knowl Manag 21(04):2250061","journal-title":"J Inf Knowl Manag"},{"key":"2014_CR28","doi-asserted-by":"publisher","first-page":"115293","DOI":"10.1016\/j.eswa.2021.115293","volume":"183","author":"A Shokrzade","year":"2021","unstructured":"Shokrzade A, Ramezani M, Tab FA et al (2021) A novel extreme learning machine based KNN classification method for dealing with big data. Expert Syst Appl 183:115293","journal-title":"Expert Syst Appl"},{"key":"2014_CR29","doi-asserted-by":"publisher","first-page":"108026","DOI":"10.1016\/j.buildenv.2021.108026","volume":"202","author":"L Xiong","year":"2021","unstructured":"Xiong L, Yao Y (2021) Study on an adaptive thermal comfort model with k-nearest-neighbors (KNN) algorithm. Build Environ 202:108026","journal-title":"Build Environ"},{"issue":"4","key":"2014_CR30","first-page":"341","volume":"8","author":"EY Boateng","year":"2020","unstructured":"Boateng EY, Otoo J, Abaye DA (2020) Basic tenets of classification algorithms k-nearest-neighbor, support vector machine, random forest and neural network: a review. J Data Anal Inf Process 8(4):341\u2013357","journal-title":"J Data Anal Inf Process"},{"key":"2014_CR31","doi-asserted-by":"publisher","first-page":"82","DOI":"10.54097\/hset.v1i.431","volume":"1","author":"Y Zhong","year":"2022","unstructured":"Zhong Y (2022) An overview of RSA and OAEP padding. Highlights Sci Eng Technol 1:82\u201386","journal-title":"Highlights Sci Eng Technol"},{"key":"2014_CR32","unstructured":"Shumow D (2020) Incorrectly generated rsa keys: How to recover lost plaintexts. Cryptology ePrint Archive"},{"issue":"6","key":"2014_CR33","doi-asserted-by":"publisher","first-page":"1342","DOI":"10.1093\/comjnl\/bxac199","volume":"66","author":"D Shumow","year":"2023","unstructured":"Shumow D (2023) Incorrectly generated RSA keys: how i learned to stop worrying and recover lost plaintexts. Comput J 66(6):1342\u20131349","journal-title":"Comput J"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02014-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-02014-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02014-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T13:18:38Z","timestamp":1757251118000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-02014-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,17]]},"references-count":33,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2014"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-02014-4","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2025,7,17]]},"assertion":[{"value":"13 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"389"}}