Key generation for plain text in stream cipher via bi-objective evolutionary computing
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Carlos M. Fonseca,et al. On the Computation of the Empirical Attainment Function , 2011, EMO.
[3] Steven M. Bellovin,et al. Frank Miller: Inventor of the One-Time Pad , 2011, Cryptologia.
[4] Benjamin Ferriman. Cryptanalysis of the RC4 Stream Cipher using Evolutionary Computation Methods , 2013 .
[5] Wasan Shaker Awad. On the Application of Evolutionary Computation Techniques in Designing Stream Cipher Systems , 2011 .
[6] G. A. Vijayalakshmi Pai,et al. Stream cipher for binary image encryption using Ant Colony Optimization based key generation , 2012, Appl. Soft Comput..
[7] Rainer Storn,et al. Differential Evolution – A Simple and Efficient Heuristic for global Optimization over Continuous Spaces , 1997, J. Glob. Optim..
[8] Marin Golub,et al. On evolutionary computation methods in cryptography , 2011, 2011 Proceedings of the 34th International Convention MIPRO.
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Emmanouil Kalligeros,et al. Optimal Selective Huffman Coding for Test-Data Compression , 2007, IEEE Transactions on Computers.
[11] G. A. Vijayalakshmi Pai,et al. Swarm intelligence based key generation for text encryption in cellular networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[12] P. N. Suganthan,et al. Differential Evolution: A Survey of the State-of-the-Art , 2011, IEEE Transactions on Evolutionary Computation.
[13] Bin Zhang,et al. Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha , 2012, ICISC.
[14] Pedro Isasi Viñuela,et al. On the design of state-of-the-art pseudorandom number generators by means of genetic programming , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[15] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[16] Safya Belghith,et al. Joint compression and encryption using chaotically mutated Huffman trees , 2010 .
[17] Michael N. Vrahatis,et al. Cryptography and Cryptanalysis Through Computational Intelligence , 2007, Computational Intelligence in Information Assurance and Security.
[18] K. P. Subbalakshmi,et al. Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.
[19] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[20] Pedro Isasi,et al. Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography , 2004 .
[21] James Kennedy,et al. Particle swarm optimization , 1995, Proceedings of ICNN'95 - International Conference on Neural Networks.
[22] Yong Zeng,et al. Pseudorandom number generators based on evolutionary algorithm , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[23] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[24] Subariah Ibrahim,et al. A Review on Biological Inspired Computation in Cryptology , 2005 .
[25] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[26] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[27] Ioannis Andreadis,et al. Comparison between cellular automata and linear feedback shift registers based pseudo-random number generators , 1997, Microprocess. Microsystems.
[28] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[29] Carlos M. Fonseca,et al. Exploring the Performance of Stochastic Multiobjective Optimisers with the Second-Order Attainment Function , 2005, EMO.
[30] Simon Y. Foo,et al. Evolving ant colony systems in hardware for random number generation , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[31] Steven Guan,et al. An evolutionary approach to the design of controllable cellular automata structure for random number generation , 2003, IEEE Trans. Evol. Comput..
[32] Zong Woo Geem,et al. A New Heuristic Optimization Algorithm: Harmony Search , 2001, Simul..
[33] A. Rukhin,et al. Statistical Testing of Random Number Generators , 1999 .
[34] William Millan,et al. Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes , 1999, ICICS.
[35] Pedro Isasi Viñuela,et al. Evolutionary Computation in computer security and cryptography , 2005, New Generation Computing.
[36] Marco Dorigo,et al. Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.
[37] Iwona Polak,et al. Genetic Algorithm in Stream Cipher Cryptanalysis , 2015, ICCCI.
[38] G. A. Vijayalakshmi Pai,et al. Swarm intelligence based key generation for stream cipher , 2011, Secur. Commun. Networks.
[39] Siddharth Bali,et al. Public key cryptography using neural networks and genetic algorithms , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).
[40] Vadlamani Ravi,et al. Modified Harmony Search Applied to Reliability Optimization of Complex Systems , 2015, ICHSA.