Evolutionary Algorithms, Fuzzy Logic and Artificial Immune Systems applied to Cryptography and Cryptanalysis: State-of-the-art review
暂无分享,去创建一个
[1] M. N. Vrahatisa,et al. Evolutionary computation based cryptanalysis : A first study , 2005 .
[2] Vipin Tyagi,et al. Problem Reduction in Online Payment System Using Hybrid Model , 2011, ArXiv.
[3] Alonso Corona-Chavez,et al. De-Encryption of a Text in Spanish Using Probability and Statistics , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).
[4] Ali Aydin Selçuk,et al. On Probability of Success in Linear and Differential Cryptanalysis , 2008, Journal of Cryptology.
[5] SelçukAli Aydın. On Probability of Success in Linear and Differential Cryptanalysis , 2008 .
[6] K. W. Lee,et al. DECRYPTING ENGLISH TEXT USING ENHANCED FREQUENCY ANALYSIS , 2006 .
[7] V. Bhusari,et al. Study of Hidden Markov Model in credit card fraudulent detection , 2011, 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave).
[8] Hussein A. Abdou,et al. Credit card fraud and detection techniques : a review , 2009 .
[9] Mauro Birattari,et al. Swarm Intelligence , 2012, Lecture Notes in Computer Science.
[10] Michael J. Wiener. The Full Cost of Cryptanalytic Attacks , 2003, Journal of Cryptology.
[11] Amr M. Youssef,et al. Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[12] Abhinav Srivastava,et al. Credit Card Fraud Detection Using Hidden Markov Model , 2008, IEEE Transactions on Dependable and Secure Computing.
[13] Ralph Howard,et al. Data encryption standard , 1987 .
[14] Stephen M. Matyas,et al. The data encryption standard , 1997, Inf. Secur. Tech. Rep..
[15] Shamik Sural,et al. Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning , 2009, Inf. Fusion.
[16] Jongan Park,et al. The improved data encryption standard (DES) algorithm , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.
[17] Kevin Knight,et al. Attacking Letter Substitution Ciphers with Integer Programming , 2009, Cryptologia.
[18] Vinaya Babu,et al. Effect of Language Complexity on Deciphering Substitution Ciphers - A Case Study on Telugu , 2010 .
[19] A.M.B. Albassall,et al. Genetic algorithm cryptanalysis of a feistel type block cipher , 2004, International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04..
[20] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[21] John Fulcher,et al. Computational Intelligence: An Introduction , 2008, Computational Intelligence: A Compendium.
[22] Carlisle M. Adams. Designing against a class of algebraic attacks on symmetric block ciphers , 2006, Applicable Algebra in Engineering, Communication and Computing.
[23] S. Arumugam,et al. Breaking Transposition Cipher with Genetic Algorithm , 2007 .
[24] Hongxia Wang,et al. Efficient Image Encryption Using a Chaos-based PWL Memristor , 2010 .
[25] Kevin Knight,et al. Attacking Decipherment Problems Optimally with Low-Order N-gram Models , 2008, EMNLP.
[26] Sean Simmons,et al. Algebraic Cryptanalysis of Simplified AES* , 2009, Cryptologia.
[27] Jun Song,et al. Cryptanalysis of Four-Round DES Based on Genetic Algorithm , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[28] S. V. Wunnava,et al. Data encryption performance and evaluation schemes , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).
[29] M. L. Valarmathi,et al. Cryptanalysis of S-DES using Genetic Algorithm , 2009 .