Evolutionary Computation in computer security and cryptography
暂无分享,去创建一个
[1] H. Feistel. Cryptography and Computer Privacy , 1973 .
[2] W. Kinzel,et al. Secure exchange of information by synchronization of neural networks , 2002 .
[3] Richard Spillman,et al. Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms , 1993, Cryptologia.
[4] Alan T. Sherman,et al. How to Break Gifford's Cipher , 1997, Cryptologia.
[5] Marco Tomassini,et al. Co-evolving Parallel Random Number Generators , 1996, PPSN.
[6] Andrew J. Clark,et al. A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher , 1997, Cryptologia.
[7] S. Wolfram. Random sequence generation by cellular automata , 1986 .
[8] José María Sierra,et al. Genetic Cryptoanalysis of Two Rounds TEA , 2002, International Conference on Computational Science.
[9] John M. Carroll,et al. The Automated Cryptanalysis of Polyalphabetic Ciphers , 1987, Cryptologia.
[10] William Millan,et al. An effective genetic algorithm for finding highly nonlinear Boolean Functions , 1997, ICICS.
[11] Willi Meier,et al. Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.
[12] John A. Clark,et al. Fault Injection and a Timing Channel on an Analysis Technique , 2002, EUROCRYPT.
[13] Thomas P. Jakobsen,et al. A Fast Method for the Cryptanalysis of Substitution Ciphers , 1995 .
[14] G. Athithan,et al. An Automated Approach to Solve Simple Substitution Ciphers , 1993, Cryptologia.
[15] Azriel Rosenfeld,et al. Breaking substitution ciphers using a relaxation algorithm , 1979, CACM.
[16] Reihaneh Safavi-Naini,et al. Automated Cryptanalysis of Transposition Ciphers , 1994, Comput. J..
[17] Adi Shamir,et al. Analysis of Neural Cryptography , 2002, ASIACRYPT.
[18] Joos Vandewalle,et al. Efficient pseudorandom sequence generation by cellular automata , 1991 .
[19] Alan T. Sherman,et al. Statistical Techniques for Language Recognition: an Introduction and Guide for Cryptanalysts , 1993, Cryptologia.
[20] Richard Spillman,et al. Use of a genetic algorithm in the crypt-analysis of simple substitution ciphers , 1993 .
[21] Alan T. Sherman,et al. How to break Gifford's cipher (extended abstract) , 1994, CCS '94.
[22] Joos Vandewalle,et al. A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton , 1991, ASIACRYPT.
[23] Marco Tomassini,et al. Generating Parallel Random Number Generators By Cellular Programming , 1996 .
[24] J.C. Hernandez,et al. Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[25] David Wagner,et al. A Programmable Plaintext Recognizer , 1994 .
[26] Azriel Rosenfeld,et al. Scene Labeling by Relaxation Operations , 1976, IEEE Transactions on Systems, Man, and Cybernetics.
[27] D. G. N. Hunter,et al. Experiments with Relaxation Algorithms for Breaking Simple Substitution Ciphers , 1983, Comput. J..
[28] Wolfgang Kinzel,et al. Cryptography based on neural networks—analytical results , 2002 .
[29] Reihaneh Safavi-Naini,et al. Automated Cryptanalysis of Substitution Ciphers , 1993, Cryptologia.
[30] Réjane Forré,et al. The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.
[31] John M. Carroll,et al. The Automated Cryptanalysis of Substitution Ciphers , 1986, Cryptologia.
[32] Wolfgang Kinzel,et al. Learning and predicting time series by neural networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[33] Stephen Wolfram. Cryptography with Cellular Automata , 1985, CRYPTO.
[34] David Pointcheval,et al. A New Identification Scheme Based on the Perceptrons Problem , 1995, EUROCRYPT.
[35] Victor J. Rayward-Smith,et al. The Cryptanalysis of a Three Rotor Machine Using a Genetic Algorithm , 1997, ICGA.
[36] John C. King. An Algorithm for the Complete Automated Cryptanalysis of Periodic Polyalphabetic Substitution Ciphers , 1994, Cryptologia.
[37] Dennis R. Bahler,et al. An Implementation of Probabilistic Relaxation in the Cryptanalysis of Simple Substitution Ciphers , 1992, Cryptologia.
[38] Steven Guan,et al. An evolutionary approach to the design of controllable cellular automata structure for random number generation , 2003, IEEE Trans. Evol. Comput..