<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-05-10T02:44:47.375Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:3:7709" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:3:7709</identifier>
                <datestamp>2020-08-11T07:20:06Z</datestamp>
                <setSpec>3</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Cryptanalysis and Security Evaluation Using Artificial Neural Networks</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2020</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/3/7709</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">https://www.routledge.com/Internet-of-Everything-IoE/book-series/CRCIOESPP</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:31113" confidence="-1">N. Vukobrat</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-2875-685X" confidence="-1">S. Adamović</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:31115" confidence="-1">N. Maček</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:31116" confidence="-1">M. Saračević</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:31117" confidence="-1">M. Gnjatović</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">This chapter introduces a novel methodology for determining mutual information
between secret key and cipher message. The methodology is based on using artificial
intelligence, specifically neural networks, to determine correlations that can be found in the
weak and medium encryption algorithms. Furthermore, this chapter presents a relevant
survey in the field of research with a similar purpose, a detailed description of the developing
environment, a theoretical overview of the matter, as well as a detailed methodology
description with additional results. The final results show the performance of the proposed
methodology, as well as the results of applying it to today&amp;apos;s most secured algorithms. Based
on the obtained results, this chapter proves the efficiency of the proposed methodology.
Besides, having AES and DES as reference algorithms, it is sure that this methodology could
be applied to real-world algorithms.</dim:field>
                    <dim:field mdschema="dc" element="type">bookPart</dim:field>
                    <dim:field mdschema="dc" element="publisher">CRC Press, Taylor &amp;amp; Francis, USA)</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">1</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">24</dim:field>
                    <dim:field mdschema="dc" element="source">Integration of WSNs into Internet of Things: A Security Perspective&amp;quot; (Series:  Internet of Everything’s (IoE) : Security and Privacy Paradigm</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
