Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming
暂无分享,去创建一个
Juan E. Tapiador | Julio César Hernández Castro | Arturo Ribagorda | Benjamín Ramos | J. Tapiador | A. Ribagorda | J. Castro | Benjamín Ramos
[1] Bruce Schneier,et al. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.
[2] Jennifer Seberry,et al. Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI , 1991, ASIACRYPT.
[3] Miodrag J. Mihaljevic. An improved key stream generator based on the programmable cellular automata , 1997, ICICS.
[4] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[5] G. Marsaglia,et al. Some Difficult-to-pass Tests of Randomness , 2022 .
[6] Hideki Imai,et al. A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation , 1998, Public Key Cryptography.
[7] H. Feistel. Cryptography and Computer Privacy , 1973 .
[8] H. C. Williams,et al. Advances in Cryptology — CRYPTO ’85 Proceedings , 2000, Lecture Notes in Computer Science.
[9] Roger M. Needham,et al. TEA, a Tiny Encryption Algorithm , 1994, FSE.
[10] Ralph Howard,et al. Data encryption standard , 1987 .
[11] Bruce Schneier,et al. Related-Key Cryptanalysis of 3-WAY , 1997 .
[12] Marcin Seredynski,et al. Block cipher based on reversible cellular automata , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[13] Takuji Nishimura,et al. Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.
[14] John R. Koza,et al. Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.
[15] Bruce Schneier,et al. Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.
[16] Réjane Forré,et al. The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.
[17] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[18] David J. Sager,et al. The microarchitecture of the Pentium 4 processor , 2001 .
[19] C. Adams,et al. DESIGNING S-BOXES FOR CIPHERS RESISTANT TO DIFFERENTIAL CRYPTANALYSIS ( Extended , 1993 .
[20] Shoji Miyaguchi,et al. Fast Data Encipherment Algorithm FEAL , 1987, EUROCRYPT.
[21] A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application , 2001 .
[22] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.