A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystem
暂无分享,去创建一个
[1] Harish Sharma,et al. Artificial bee colony algorithm with global and local neighborhoods , 2014, International Journal of System Assurance Engineering and Management.
[2] Betül Sultan Yıldız,et al. A comparative investigation of eight recent population-based optimisation algorithms for mechanical and structural design problems , 2017 .
[3] Nantiwat Pholdee,et al. Hybrid real-code population-based incremental learning and differential evolution for many-objective optimisation of an automotive floor-frame , 2017, International Journal of Vehicle Design.
[4] Betül Sultan Yıldız,et al. Fatigue-based structural optimisation of vehicle components , 2017 .
[5] Ali Rıza Yıldız,et al. A comparison of recent metaheuristic algorithms for crashworthiness optimisation of vehicle thin-walled tubes considering sheet metal forming effects , 2017 .
[6] El-Sayed M. El-Alfy,et al. Computational Intelligence in Cryptology , 2017 .
[7] Morteza Kiani,et al. A Comparative Study of Non-traditional Methods for Vehicle Crashworthiness and NVH Optimization , 2016 .
[8] Ali R. Yildiz,et al. Structural design of vehicle components using gravitational search and charged system search algorithms , 2015 .
[9] Ali Rıza Yıldız,et al. Optimization of thin-wall structures using hybrid gravitational search and Nelder-Mead algorithm , 2015 .
[10] Ashish Jain,et al. A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers , 2015, ICONIP.
[11] Ashish Jain,et al. Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks , 2015, NSS.
[12] Jagdish Chand Bansal,et al. Fitness based particle swarm optimization , 2015, Int. J. Syst. Assur. Eng. Manag..
[13] Santanu Chaudhury,et al. Cryptanalysis of Vigenere cipher using Cuckoo Search , 2015, Appl. Soft Comput..
[14] Urszula Boryczka,et al. Genetic Transformation Techniques in Cryptanalysis , 2014, ACIIDS.
[15] Ashish Jain,et al. Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm Optimization , 2014, SOCO-CISIS-ICEUTE.
[16] Binheng Song,et al. SHipher: Families of Block Ciphers based on SubSet-Sum Problem , 2014, IACR Cryptol. ePrint Arch..
[17] Zhihua Cui,et al. Swarm Intelligence and Bio-Inspired Computation: Theory and Applications , 2013 .
[18] Ali R. Yildiz,et al. Cuckoo search algorithm for the selection of optimal machining parameters in milling operations , 2012, The International Journal of Advanced Manufacturing Technology.
[19] Ali R. Yildiz,et al. Comparison of evolutionary-based optimization algorithms for structural design optimization , 2013, Eng. Appl. Artif. Intell..
[20] Kusum Deep,et al. A Modified Binary Particle Swarm Optimization for Knapsack Problems , 2012, Appl. Math. Comput..
[21] M. Danziger,et al. Computational Intelligence Applied on Cryptology: a brief review , 2012, IEEE Latin America Transactions.
[22] K. Martin. Everyday Cryptography: Fundamental Principles and Applications , 2012 .
[23] Sangwook Lee,et al. Modified Binary Particle Swarm Optimization for Multidimensional Knapsack Problem , 2011 .
[24] Malay Kule,et al. A cryptanalytic attack on the knapsack cryptosystem using binary Firefly algorithm , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[25] S. N. Sinha,et al. A cryptanalytic attack on Knapsack cipher using Differential Evolution algorithm , 2011, 2011 IEEE Recent Advances in Intelligent Computational Systems.
[26] Ian Goldberg,et al. Generalizing cryptosystems based on the subset sum problem , 2011, International Journal of Information Security.
[27] Kazuhiro Saitou,et al. Topology Synthesis of Multicomponent Structural Assemblies in Continuum Domains , 2011 .
[28] Charlie Obimbo,et al. An evolutionary computation attack on one-round TEA , 2011, Complex Adaptive Systems.
[29] Xin-She Yang,et al. Engineering optimisation by cuckoo search , 2010, Int. J. Math. Model. Numer. Optimisation.
[30] Yupu Hu,et al. Quadratic compact knapsack public-key cryptosystem , 2010, Comput. Math. Appl..
[31] Xin-She Yang,et al. Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).
[32] Ali R. Yildiz,et al. Hybrid immune-simulated annealing algorithm for optimal design and manufacturing , 2009 .
[33] Ali R. Yildiz,et al. A novel hybrid immune algorithm for global optimization in design and manufacturing , 2009 .
[34] Ali R. Yildiz,et al. An effective hybrid immune-hill climbing optimization approach for solving design and manufacturing optimization problems in industry , 2009 .
[35] Raghavan Muthuregunathan,et al. Cryptanalysis of Knapsack Cipher using Parallel Evolutionary Computing , 2009 .
[36] M.F. AbdulHalim,et al. A binary Particle Swarm Optimization for attacking knapsacks Cipher Algorithm , 2008, 2008 International Conference on Computer and Communication Engineering.
[37] Yupu Hu,et al. A knapsack-based probabilistic encryption scheme , 2007, Inf. Sci..
[38] M. A. Khanesar,et al. A novel binary particle swarm optimization , 2007, 2007 Mediterranean Conference on Control & Automation.
[39] N. Nalini,et al. Attacks of simple block ciphers via efficient heuristics , 2007, Inf. Sci..
[40] Evripidis Bampis,et al. Handbook of Approximation Algorithms and Metaheuristics , 2007 .
[41] Nadia Nedjah,et al. Computational Intelligence in Information Assurance and Security , 2007, Studies in Computational Intelligence.
[42] Michael N. Vrahatis,et al. Cryptography and Cryptanalysis Through Computational Intelligence , 2007, Computational Intelligence in Information Assurance and Security.
[43] Ching Y. Suen,et al. A Genetic Binary Particle Swarm Optimization Model , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[44] N. Franken,et al. Combining particle swarm optimisation with angle modulation to solve binary problems , 2005, 2005 IEEE Congress on Evolutionary Computation.
[45] David E. Goldberg,et al. Genetic algorithms and Machine Learning , 1988, Machine Learning.
[46] John Fulcher,et al. Computational Intelligence: An Introduction , 2008, Computational Intelligence: A Compendium.
[47] Michael D. Vose,et al. The simple genetic algorithm - foundations and theory , 1999, Complex adaptive systems.
[48] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[49] Yue Shi,et al. A modified particle swarm optimizer , 1998, 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98TH8360).
[50] Russell C. Eberhart,et al. A discrete binary version of the particle swarm algorithm , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[51] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[52] Zbigniew Michalewicz,et al. Genetic Algorithms + Data Structures = Evolution Programs , 1996, Springer Berlin Heidelberg.
[53] James Kennedy,et al. Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.
[54] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[55] Lalit M. Patnaik,et al. Genetic algorithms: a survey , 1994, Computer.
[56] R. Mantegna,et al. Fast, accurate algorithm for numerical simulation of Lévy stable stochastic processes. , 1994, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[57] Reihaneh Safavi-Naini,et al. Automated Cryptanalysis of Substitution Ciphers , 1993, Cryptologia.
[58] Richard Spillman,et al. Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms , 1993, Cryptologia.
[59] Robert A. J. Matthews,et al. The Use of Genetic Algorithms in Cryptanalysis , 1993, Cryptologia.
[60] Richard Spillman,et al. Use of a genetic algorithm in the crypt-analysis of simple substitution ciphers , 1993 .
[61] Stephen C. Pohlig,et al. An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance , 2022, IEEE Trans. Inf. Theory.
[62] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.