Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm
暂无分享,去创建一个
Fan Yang | Huanguo Zhang | Jun Song | Maocai Wang | Huanguo Zhang | Fan Yang | Jun Song | Maocai Wang
[1] A.-M.A. Wahdan,et al. Genetic algorithm cryptanalysis of the basic substitution permutation network , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[2] M. N. Vrahatis,et al. Evolutionary computation based cryptanalysis: A first study , 2005 .
[3] Andrew Clark,et al. Optimisation heuristics for cryptology , 1998 .
[4] Susan Stepney,et al. Making the most of two heuristics: breaking transposition ciphers with ants , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[5] John Hughes. Special Issue 31:: 10th Euroseminar on Microscopy Applied to Building Materials (EMABM) , 2007 .
[6] Susan Stepney,et al. Using Ants to Attack a Classical Cipher , 2003, GECCO.
[7] Danilo Gligoroski,et al. Attacks on the Transposition Ciphers Using Optimization Heuristics , 2003 .
[8] Habiba Drias,et al. Cryptanalysis of Substitution Ciphers Using Scatter Search , 2005, IWINAC.
[9] Susan Stepney,et al. The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[10] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[12] Andrew Clark,et al. Modern optimisation algorithms for cryptanalysis , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.
[13] A.G. Bafghi,et al. Finding suitable differential characteristics for block ciphers with Ant colony technique , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).
[14] S. Arumugam,et al. Breaking Transposition Cipher with Genetic Algorithm , 2007 .
[15] Robert A. J. Matthews,et al. The Use of Genetic Algorithms in Cryptanalysis , 1993, Cryptologia.
[16] Edgar N. Reyes,et al. Genetic Algorithms: Theory And Application , 1998 .
[17] Julian F. Miller,et al. Genetic and Evolutionary Computation — GECCO 2003 , 2003, Lecture Notes in Computer Science.
[18] John A. Clark,et al. Nature-inspired cryptography: past, present and future , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..