{"id":"https://openalex.org/W4308642210","doi":"https://doi.org/10.1145/3548606.3563493","title":"Poster EveGAN","display_name":"Poster EveGAN","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308642210","doi":"https://doi.org/10.1145/3548606.3563493"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3563493","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3563493","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039734959","display_name":"Roger A. Hallman","orcid":"https://orcid.org/0000-0002-0971-2077"},"institutions":[{"id":"https://openalex.org/I107672454","display_name":"Dartmouth College","ror":"https://ror.org/049s0rh22","country_code":"US","type":"education","lineage":["https://openalex.org/I107672454"]},{"id":"https://openalex.org/I1339224429","display_name":"Naval Information Warfare Center Pacific","ror":"https://ror.org/01gs1cg95","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330347796","https://openalex.org/I1339224429","https://openalex.org/I2802223155","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Roger A. Hallman","raw_affiliation_strings":["Dartmouth College &amp; Naval Information Warfare Center (NIWC) Pacific, San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"Dartmouth College &amp; Naval Information Warfare Center (NIWC) Pacific, San Diego, CA, USA","institution_ids":["https://openalex.org/I1339224429","https://openalex.org/I107672454"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5039734959"],"corresponding_institution_ids":["https://openalex.org/I107672454","https://openalex.org/I1339224429"],"apc_list":null,"apc_paid":null,"fwci":0.1227,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.26698262,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"3355","last_page":"3357"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7704281806945801},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6183711290359497},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5789938569068909},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5549491047859192},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4949929118156433},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4825719892978668},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4566878080368042},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4517650902271271},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3883022367954254},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21764379739761353},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.08820837736129761}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7704281806945801},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6183711290359497},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5789938569068909},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5549491047859192},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4949929118156433},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4825719892978668},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4566878080368042},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4517650902271271},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3883022367954254},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21764379739761353},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.08820837736129761}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3563493","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3563493","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1724006351","https://openalex.org/W1892798954","https://openalex.org/W2073210531","https://openalex.org/W2100197298","https://openalex.org/W2502170095","https://openalex.org/W2799397159","https://openalex.org/W2803525166","https://openalex.org/W2889580470","https://openalex.org/W2952680377","https://openalex.org/W2963017889","https://openalex.org/W2969001071","https://openalex.org/W2972818416","https://openalex.org/W3007328579","https://openalex.org/W3101313921","https://openalex.org/W4206796315","https://openalex.org/W4210300416"],"related_works":["https://openalex.org/W2887779253","https://openalex.org/W4362706650","https://openalex.org/W18954787","https://openalex.org/W3138083505","https://openalex.org/W2783353176","https://openalex.org/W4254460476","https://openalex.org/W4390962791","https://openalex.org/W2339543721","https://openalex.org/W1829339118","https://openalex.org/W3179891621"],"abstract_inverted_index":{"Cryptography":[0],"and":[1,38,92],"Machine":[2],"Learning":[3],"are":[4],"two":[5],"computational":[6],"science":[7],"fields":[8],"that":[9,65,109],"intuitively":[10],"seem":[11],"related.":[12],"Privacy-preserving":[13],"machine":[14,54,100],"learning-either":[15],"utilizing":[16],"encrypted":[17,22],"models":[18],"or":[19],"learning":[20,55,101],"over":[21],"data-is":[23],"an":[24,107],"exploding":[25],"field":[26],"thanks":[27],"to":[28,56,80,143],"the":[29,57,61,136],"maturation":[30],"of":[31,59,63,132,148],"primitives":[32],"such":[33],"as":[34,112,121],"fully":[35],"homomorphic":[36],"encryption":[37],"secure":[39],"multiparty":[40],"computation.":[41],"However":[42],"there":[43],"has":[44,126],"been":[45,127],"surprisingly":[46],"little":[47],"work":[48],"on":[49,140],"applying":[50],"recent":[51],"advances":[52],"in":[53],"task":[58],"cryptanalysis,":[60],"branch":[62],"cryptography":[64],"studies":[66],"how":[67],"cryptographic":[68,77],"ciphers":[69],"can":[70],"be":[71],"attacked.":[72],"In":[73],"particular,":[74],"while":[75],"a":[76,98,113,122,130,145],"cipher":[78,119],"seeks":[79],"keep":[81],"certain":[82],"information":[83],"secret":[84],"by":[85],"making":[86],"it":[87],"appear":[88],"random,":[89],"discerning":[90],"patterns":[91],"structure":[93],"from":[94],"random":[95],"data":[96],"is":[97],"common":[99],"task.":[102],"This":[103],"paper":[104],"proposes":[105],"EveGAN,":[106],"approach":[108,138],"treats":[110],"cryptanalysis":[111,152],"language":[114,123],"translation":[115,124],"problem.":[116],"While":[117],"treating":[118],"cracking":[120],"problem":[125],"validated":[128],"against":[129],"handful":[131],"classical":[133],"substitution":[134],"ciphers,":[135],"EveGAN":[137],"builds":[139],"these":[141],"results":[142],"create":[144],"new":[146],"class":[147],"generative":[149],"deep":[150],"learning-based":[151],"attacks.":[153]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-11-13T00:00:00"}
