Cryptanalysis of Four-Rounded DES Using Binary Artificial Immune System
暂无分享,去创建一个
[1] Sanyou Zeng,et al. Advances in Computation and Intelligence, Second International Symposium, ISICA 2007, Wuhan, China, September 21-23, 2007, Proceedings , 2007, ISICA.
[2] L.N. de Castro,et al. An artificial immune network for multimodal function optimization , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[3] M. N. Vrahatisa,et al. Evolutionary computation based cryptanalysis : A first study , 2005 .
[4] D. Dasgupta. Artificial Immune Systems and Their Applications , 1998, Springer Berlin Heidelberg.
[5] Susan Stepney,et al. The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[6] Andrew Clark,et al. Modern optimisation algorithms for cryptanalysis , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.
[7] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[8] Susan Stepney,et al. Using Ants to Attack a Classical Cipher , 2003, GECCO.
[9] Ralph Morelli,et al. A Study of Heuristic Approaches for Breaking Short Cryptograms , 2004, Int. J. Artif. Intell. Tools.
[10] A.G. Bafghi,et al. Finding suitable differential characteristics for block ciphers with Ant colony technique , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[11] A. Ribagorda,et al. Easing collision finding in cryptographic primitives with genetic algorithms , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[12] Jun Song,et al. Cryptanalysis of Four-Round DES Based on Genetic Algorithm , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[13] Mitsuru Matsui,et al. The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.
[14] Julian F. Miller,et al. Genetic and Evolutionary Computation — GECCO 2003 , 2003, Lecture Notes in Computer Science.
[15] SpillmanRichard,et al. Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers , 1993 .
[16] José María Sierra,et al. Genetic Cryptoanalysis of Two Rounds TEA , 2002, International Conference on Computational Science.
[17] Huanguo Zhang,et al. Cryptanalysis of Two-Round DES Using Genetic Algorithms , 2007, ISICA.
[18] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[19] Jack Dongarra,et al. Computational Science — ICCS 2002 , 2002, Lecture Notes in Computer Science.
[20] Farrukh Aslam Khan,et al. Cryptanalysis of four-rounded DES using binary particle swarm optimization , 2009, GECCO '09.