A Review on Swarm Intelligence Techniques in Automated Cryptanalysis of Classical Substitution Cipher
暂无分享,去创建一个
[1] John Fulcher,et al. Computational Intelligence: An Introduction , 2008, Computational Intelligence: A Compendium.
[2] Oded Goldreich. P, Np, and Np-Completeness: The Basics of Computational Complexity , 2010 .
[3] M. Heydari,et al. Automated Cryptanalysis of Transposition Ciphers Using Cuckoo Search Algorithm , 2014 .
[4] El-Sayed M. El-Alfy,et al. Computational Intelligence in Cryptology , 2017 .
[5] Xin-She Yang,et al. Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).
[7] Amr M. Youssef,et al. Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[9] Ian C. Parmee,et al. The Ant Colony Metaphor for Searching Continuous Design Spaces , 1995, Evolutionary Computing, AISB Workshop.
[10] Ashish Jain,et al. A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers , 2015, ICONIP.
[11] Ahmed Azouaoui,et al. Ant Colony Optimization for Cryptanalysis of Simplified-DES , 2018 .
[12] Ajith Abraham,et al. Known-plaintext attack of DES-16 using Particle Swarm Optimization , 2011, 2011 Third World Congress on Nature and Biologically Inspired Computing.
[13] Joshua Holden,et al. The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption , 2017 .
[14] Harish Sharma,et al. Application of Binary Particle Swarm Optimization in Cryptanalysis of DES , 2011, SocProS.
[15] Ahmed Azouaoui,et al. A cryptanalytic attack of simplified-AES using ant colony optimization , 2019 .
[16] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[17] J. Paulo Davim,et al. Firefly Algorithm , 2019, Optimizing Engineering Problems through Heuristic Techniques.
[18] Malay Kule,et al. A cryptanalytic attack on the knapsack cryptosystem using binary Firefly algorithm , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[19] Ahmed T. Sadiq,et al. Mutation-Based Particle Swarm Optimization (MPSO) to Attack Classical Cryptography Methods , 2012 .
[20] M.N.S. Swamy,et al. Search and Optimization by Metaheuristics: Techniques and Algorithms Inspired by Nature , 2016 .
[21] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[22] Ashok K. Bhateja,et al. Cryptanalysis of Vigenere Cipher using Particle Swarm Optimization with Markov chain random walk , 2013 .
[23] I. K. Ali. Cryptanalysis of Simple Substitution Ciphers Using Bees Algorithm , 2013 .
[24] Santanu Chaudhury,et al. Cryptanalysis of Vigenere cipher using Cuckoo Search , 2015, Appl. Soft Comput..
[25] J. Davim,et al. Bees Algorithm , 2019, Optimizing Engineering Problems through Heuristic Techniques.
[26] Xin-She Yang,et al. Nature-Inspired Optimization Algorithms: Challenges and Open Problems , 2020, J. Comput. Sci..
[27] M. Danziger,et al. Computational Intelligence Applied on Cryptology: a brief review , 2012, IEEE Latin America Transactions.
[28] Ashish Jain,et al. An Improved Genetic Algorithm and A New Discrete Cuckoo Algorithm for Solving the Classical Substitution Cipher , 2019, Int. J. Appl. Metaheuristic Comput..
[29] Farrukh Aslam Khan,et al. Cryptanalysis of four-rounded DES using binary particle swarm optimization , 2009, GECCO '09.
[30] Tahar Mekhaznia,et al. Cryptanalysis of classical ciphers with ant algorithms , 2014, Int. J. Metaheuristics.
[31] Musheer Ahmad,et al. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map , 2018, Neural Computing and Applications.
[32] Sarab M. Hameed,et al. PARTICLES SWARM OPTIMIZATION FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER , 2010 .
[33] Saibal K. Pal,et al. A hybrid Firefly Algorithm using genetic operators for the cryptanalysis of a monoalphabetic substitution cipher , 2011, 2011 World Congress on Information and Communication Technologies.
[34] Amrit Pal Singh,et al. The Firefly Algorithm and Application in Cryptanalysis of Monoalphabetic Substitution Ciphers , 2013 .
[35] Ahmed Azouaoui,et al. A Novel Ant Colony Optimization Based Cryptanalysis of Substitution Cipher , 2016, AECIA.
[36] Pedro Isasi Viñuela,et al. Evolutionary Computation in computer security and cryptography , 2005, New Generation Computing.
[37] Nderim Zeqiri. Adaptation and research development in the spectrum of methods with advanced access in the area of communication and computer system , 2012 .
[38] Susan Stepney,et al. Making the most of two heuristics: breaking transposition ciphers with ants , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..
[39] V. K. Jayaraman,et al. Ant colony framework for optimal design and scheduling of batch plants , 2000 .
[40] Shweta Pandey,et al. Particle Swarm Optimization in Cryptanalysis of DES , 2012 .
[41] Farrukh Aslam Khan,et al. Cryptanalysis of Four-Rounded DES Using Ant Colony Optimization , 2010, 2010 International Conference on Information Science and Applications.
[42] Amr M. Youssef,et al. An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[43] M.F. AbdulHalim,et al. A binary Particle Swarm Optimization for attacking knapsacks Cipher Algorithm , 2008, 2008 International Conference on Computer and Communication Engineering.