A genetic algorithm for cryptanalysis with application to DES-like systems

被引:0
|
作者
Research Development Center, National Defense Council, Cairo, Egypt [1 ]
不详 [2 ]
不详 [3 ]
不详 [4 ]
不详 [5 ]
机构
来源
Int. J. Netw. Secur. | 2009年 / 2卷 / 177-188期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] APPLICATION OF GENETIC ALGORITHM TO CONTROL THE AVAILABILITY OF TECHNICAL SYSTEMS
    Migawa, K.
    Knopik, L.
    Wawrzyniak, S.
    ENGINEERING MECHANICS 2016, 2016, : 386 - 389
  • [42] Micro genetic Algorithm Application in Block Transmission Systems
    Babu, S. P. K.
    Ghani, Farid
    Salleh, Fadzli Mohd
    ICED: 2008 INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN, VOLS 1 AND 2, 2008, : 182 - +
  • [43] Application of genetic algorithm in economic dispatch of power systems
    Key Laboratory of Process Industry Automation of Liaoning Province, Northeastern University, Shenyang 110004, China
    Dongbei Daxue Xuebao, 2006, 11 (1181-1184):
  • [44] Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm
    Song, Jun
    Yang, Fan
    Wang, Maocai
    Zhang, Huanguo
    ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2008, 5370 : 795 - +
  • [45] Genetic algorithm cryptanalysis of the basic Substitution Permutation Network.
    Albassal, AMB
    Wahdan, AMA
    PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 471 - 475
  • [46] Improved machine learning-aided linear cryptanalysis: application to DES
    Zezhou Hou
    Jiongjiong Ren
    Shaozhen Chen
    Cybersecurity, 8 (1)
  • [47] A Review over Genetic Algorithm and Application of Wireless Network Systems
    Shah, Bimlendu
    Dahal, Sujata
    Mishra, Abhinav
    Kumar, Vinay S. B.
    Kumar, Prasanna C.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 431 - 438
  • [48] Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis
    Lee J.
    Heys H.M.
    Tavares S.E.
    Designs, Codes and Cryptography, 1997, 12 (3) : 267 - 282
  • [49] Cryptanalysis of a key refreshment scheme for multicast protocols by means of genetic algorithm
    Peinado, Alberto
    Ortiz, Andres
    LOGIC JOURNAL OF THE IGPL, 2013, 21 (04) : 671 - 679
  • [50] Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm
    Kantour, Nedjmeddine
    Bouroubi, Sadek
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 211 - 222