A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystem

[1]  Harish Sharma,et al.  Artificial bee colony algorithm with global and local neighborhoods , 2014, International Journal of System Assurance Engineering and Management.

[2]  Betül Sultan Yıldız,et al.  A comparative investigation of eight recent population-based optimisation algorithms for mechanical and structural design problems , 2017 .

[3]  Nantiwat Pholdee,et al.  Hybrid real-code population-based incremental learning and differential evolution for many-objective optimisation of an automotive floor-frame , 2017, International Journal of Vehicle Design.

[4]  Betül Sultan Yıldız,et al.  Fatigue-based structural optimisation of vehicle components , 2017 .

[5]  Ali Rıza Yıldız,et al.  A comparison of recent metaheuristic algorithms for crashworthiness optimisation of vehicle thin-walled tubes considering sheet metal forming effects , 2017 .

[6]  El-Sayed M. El-Alfy,et al.  Computational Intelligence in Cryptology , 2017 .

[7]  Morteza Kiani,et al.  A Comparative Study of Non-traditional Methods for Vehicle Crashworthiness and NVH Optimization , 2016 .

[8]  Ali R. Yildiz,et al.  Structural design of vehicle components using gravitational search and charged system search algorithms , 2015 .

[9]  Ali Rıza Yıldız,et al.  Optimization of thin-wall structures using hybrid gravitational search and Nelder-Mead algorithm , 2015 .

[10]  Ashish Jain,et al.  A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers , 2015, ICONIP.

[11]  Ashish Jain,et al.  Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks , 2015, NSS.

[12]  Jagdish Chand Bansal,et al.  Fitness based particle swarm optimization , 2015, Int. J. Syst. Assur. Eng. Manag..

[13]  Santanu Chaudhury,et al.  Cryptanalysis of Vigenere cipher using Cuckoo Search , 2015, Appl. Soft Comput..

[14]  Urszula Boryczka,et al.  Genetic Transformation Techniques in Cryptanalysis , 2014, ACIIDS.

[15]  Ashish Jain,et al.  Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm Optimization , 2014, SOCO-CISIS-ICEUTE.

[16]  Binheng Song,et al.  SHipher: Families of Block Ciphers based on SubSet-Sum Problem , 2014, IACR Cryptol. ePrint Arch..

[17]  Zhihua Cui,et al.  Swarm Intelligence and Bio-Inspired Computation: Theory and Applications , 2013 .

[18]  Ali R. Yildiz,et al.  Cuckoo search algorithm for the selection of optimal machining parameters in milling operations , 2012, The International Journal of Advanced Manufacturing Technology.

[19]  Ali R. Yildiz,et al.  Comparison of evolutionary-based optimization algorithms for structural design optimization , 2013, Eng. Appl. Artif. Intell..

[20]  Kusum Deep,et al.  A Modified Binary Particle Swarm Optimization for Knapsack Problems , 2012, Appl. Math. Comput..

[21]  M. Danziger,et al.  Computational Intelligence Applied on Cryptology: a brief review , 2012, IEEE Latin America Transactions.

[22]  K. Martin Everyday Cryptography: Fundamental Principles and Applications , 2012 .

[23]  Sangwook Lee,et al.  Modified Binary Particle Swarm Optimization for Multidimensional Knapsack Problem , 2011 .

[24]  Malay Kule,et al.  A cryptanalytic attack on the knapsack cryptosystem using binary Firefly algorithm , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[25]  S. N. Sinha,et al.  A cryptanalytic attack on Knapsack cipher using Differential Evolution algorithm , 2011, 2011 IEEE Recent Advances in Intelligent Computational Systems.

[26]  Ian Goldberg,et al.  Generalizing cryptosystems based on the subset sum problem , 2011, International Journal of Information Security.

[27]  Kazuhiro Saitou,et al.  Topology Synthesis of Multicomponent Structural Assemblies in Continuum Domains , 2011 .

[28]  Charlie Obimbo,et al.  An evolutionary computation attack on one-round TEA , 2011, Complex Adaptive Systems.

[29]  Xin-She Yang,et al.  Engineering optimisation by cuckoo search , 2010, Int. J. Math. Model. Numer. Optimisation.

[30]  Yupu Hu,et al.  Quadratic compact knapsack public-key cryptosystem , 2010, Comput. Math. Appl..

[31]  Xin-She Yang,et al.  Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).

[32]  Ali R. Yildiz,et al.  Hybrid immune-simulated annealing algorithm for optimal design and manufacturing , 2009 .

[33]  Ali R. Yildiz,et al.  A novel hybrid immune algorithm for global optimization in design and manufacturing , 2009 .

[34]  Ali R. Yildiz,et al.  An effective hybrid immune-hill climbing optimization approach for solving design and manufacturing optimization problems in industry , 2009 .

[35]  Raghavan Muthuregunathan,et al.  Cryptanalysis of Knapsack Cipher using Parallel Evolutionary Computing , 2009 .

[36]  M.F. AbdulHalim,et al.  A binary Particle Swarm Optimization for attacking knapsacks Cipher Algorithm , 2008, 2008 International Conference on Computer and Communication Engineering.

[37]  Yupu Hu,et al.  A knapsack-based probabilistic encryption scheme , 2007, Inf. Sci..

[38]  M. A. Khanesar,et al.  A novel binary particle swarm optimization , 2007, 2007 Mediterranean Conference on Control & Automation.

[39]  N. Nalini,et al.  Attacks of simple block ciphers via efficient heuristics , 2007, Inf. Sci..

[40]  Evripidis Bampis,et al.  Handbook of Approximation Algorithms and Metaheuristics , 2007 .

[41]  Nadia Nedjah,et al.  Computational Intelligence in Information Assurance and Security , 2007, Studies in Computational Intelligence.

[42]  Michael N. Vrahatis,et al.  Cryptography and Cryptanalysis Through Computational Intelligence , 2007, Computational Intelligence in Information Assurance and Security.

[43]  Ching Y. Suen,et al.  A Genetic Binary Particle Swarm Optimization Model , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[44]  N. Franken,et al.  Combining particle swarm optimisation with angle modulation to solve binary problems , 2005, 2005 IEEE Congress on Evolutionary Computation.

[45]  David E. Goldberg,et al.  Genetic algorithms and Machine Learning , 1988, Machine Learning.

[46]  John Fulcher,et al.  Computational Intelligence: An Introduction , 2008, Computational Intelligence: A Compendium.

[47]  Michael D. Vose,et al.  The simple genetic algorithm - foundations and theory , 1999, Complex adaptive systems.

[48]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[49]  Yue Shi,et al.  A modified particle swarm optimizer , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).

[50]  Russell C. Eberhart,et al.  A discrete binary version of the particle swarm algorithm , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[51]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[52]  Zbigniew Michalewicz,et al.  Genetic Algorithms + Data Structures = Evolution Programs , 1996, Springer Berlin Heidelberg.

[53]  James Kennedy,et al.  Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.

[54]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[55]  Lalit M. Patnaik,et al.  Genetic algorithms: a survey , 1994, Computer.

[56]  R. Mantegna,et al.  Fast, accurate algorithm for numerical simulation of Lévy stable stochastic processes. , 1994, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[57]  Reihaneh Safavi-Naini,et al.  Automated Cryptanalysis of Substitution Ciphers , 1993, Cryptologia.

[58]  Richard Spillman,et al.  Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms , 1993, Cryptologia.

[59]  Robert A. J. Matthews,et al.  The Use of Genetic Algorithms in Cryptanalysis , 1993, Cryptologia.

[60]  Richard Spillman,et al.  Use of a genetic algorithm in the crypt-analysis of simple substitution ciphers , 1993 .

[61]  Stephen C. Pohlig,et al.  An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance , 2022, IEEE Trans. Inf. Theory.

[62]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.