On evolutionary computation methods in cryptography
暂无分享,去创建一个
[1] A. Tragha,et al. ICIGA: Improved Cryptography Inspired by Genetic Algorithms , 2006, 2006 International Conference on Hybrid Information Technology.
[2] David Vidal,et al. Evolutionary design of pseudorandom sequence generators based on cellular automata and its applicability in current cryptosystems , 2006, GECCO '06.
[3] Xiangdong Yin,et al. S box construction and result analysis based on optimal tabu-genetic algorithm , 2010, 2010 2nd International Conference on Education Technology and Computer.
[4] Hua Chen,et al. An Effective Genetic Algorithm for Self-Inverse S-Boxes , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[5] Thomas Weise,et al. Global Optimization Algorithms -- Theory and Application , 2009 .
[6] Dengguo Feng,et al. An Effective Genetic Algorithm for Self-Inverse S-Boxes , 2007 .
[7] Dorothea Heiss-Czedik,et al. An Introduction to Genetic Algorithms. , 1997, Artificial Life.
[8] Susan Stepney,et al. The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[9] Nadia Nedjah,et al. Multi-objective evolutionary hardware for RSA-based cryptosystems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[10] Andrew Clark,et al. Optimisation heuristics for cryptology , 1998 .
[11] Nadia Nedjah,et al. Computational Intelligence in Information Assurance and Security , 2007, Studies in Computational Intelligence.
[12] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[13] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[14] Pedro Isasi,et al. Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography , 2004 .
[15] Hua Chen,et al. An effective evolutionary strategy for bijective S-boxes , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[16] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[17] Juan E. Tapiador,et al. Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions , 2008, J. Inf. Sci. Eng..
[18] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[19] John R. Koza,et al. Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.
[20] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[21] Juan E. Tapiador,et al. Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming , 2006, 2006 IEEE International Conference on Evolutionary Computation.