Cryptanalysis of TEA Using Quantum-Inspired Genetic Algorithms
暂无分享,去创建一个
[1] John J. Grefenstette,et al. Optimization of Control Parameters for Genetic Algorithms , 1986, IEEE Transactions on Systems, Man, and Cybernetics.
[2] Pedro Isasi Viñuela,et al. Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA , 2004, Comput. Intell..
[3] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[4] Bruce Schneier,et al. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.
[5] Willi Meier,et al. Correlations in RC6 with a Reduced Number of Rounds , 2000, FSE.
[6] Huanguo Zhang,et al. Cryptanalysis of Two-Round DES Using Genetic Algorithms , 2007, ISICA.
[7] Eli Biham,et al. Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials , 1999, Journal of Cryptology.
[8] Jun Song,et al. Cryptanalysis of Four-Round DES Based on Genetic Algorithm , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[9] Fan Yang,et al. Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms , 2008, ISICA.
[10] Simon J. Shepherd,et al. The Tiny Encryption Algorithm , 2007, Cryptologia.
[11] Roger M. Needham,et al. TEA, a Tiny Encryption Algorithm , 1994, FSE.
[13] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[14] R. Penrose,et al. Shadows of the Mind , 1994 .
[15] Seokhie Hong,et al. Differential Cryptanalysis of TEA and XTEA , 2003, ICISC.
[16] Jong-Hwan Kim,et al. Introduction of Quantum-inspired Evolutionary Algorithm , 2002 .
[17] Ralph Howard,et al. Data encryption standard , 1987 .
[18] Sangjin Lee,et al. Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA , 2002, FSE.