Breaking of Simplified Data Encryption Standard Using Binary Particle Swarm Optimization
暂无分享,去创建一个
[1] Kostas Papadopoulos,et al. Communication network design using Particle Swarm Optimization , 2008, 2008 International Multiconference on Computer Science and Information Technology.
[2] Russell C. Eberhart,et al. A discrete binary version of the particle swarm algorithm , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[3] Poonam Garg. Genetic Algorithm Attack on Simplified Data Encryption Standard Algorithm , 2006 .
[4] D. E. Goldberg,et al. Genetic Algorithms in Search , 1989 .
[5] S. Arumugam,et al. Breaking Transposition Cipher with Genetic Algorithm , 2007 .
[6] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[7] R. K. Ursem. Multi-objective Optimization using Evolutionary Algorithms , 2009 .
[8] Nostrand Reinhold,et al. the utility of using the genetic algorithm approach on the problem of Davis, L. (1991), Handbook of Genetic Algorithms. Van Nostrand Reinhold, New York. , 1991 .
[9] Lawrence. Davis,et al. Handbook Of Genetic Algorithms , 1990 .
[10] Edward F. Schaefer. A Simplified Data Encryption Standard Algorithm , 1996, Cryptologia.
[11] Richard Spillman,et al. Use of a genetic algorithm in the crypt-analysis of simple substitution ciphers , 1993 .
[12] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[13] Wenjun Zhang,et al. Dissipative particle swarm optimization , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[14] Zbigniew Michalewicz,et al. Evolutionary optimization of constrained problems , 1994 .
[15] Keigo Watanabe,et al. Evolutionary Optimization of Constrained Problems , 2004 .
[16] Sangwook Lee,et al. Binary Particle Swarm Optimization with Bit Change Mutation , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[17] Richard Spillman,et al. Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms , 1993, Cryptologia.
[18] M. L. Valarmathi,et al. Cryptanalysis of simplified-DES using computational intelligence , 2011 .
[19] Yilmaz Kaya,et al. A Novel Crossover Operator for Genetic Algorithms: Ring Crossover , 2011, ArXiv.
[20] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[21] D. E. Goldberg,et al. Optimization and Machine Learning , 2022 .