[1]
|
从演化密码到量子人工智能密码综述
|
|
2019 |
|
|
[2]
|
IMPACT OF GENETIC ALGORITHM IN CRYPTOLOGY–AN EMPIRICAL STUDY
|
|
International Journal of Computer Engineering and Applications,
2018 |
|
|
[3]
|
Breaching Security of Full Round Tiny Encryption Algorithm
|
|
International Journal of Information Security and Privacy (IJISP),
2018 |
|
|
[4]
|
Optimisation heuristics in randomness testing
|
|
2017 |
|
|
[5]
|
Quantum Genetic Algorithms for Computer Scientists
|
|
Computers,
2016 |
|
|
[6]
|
New results on reduced-round Tiny Encryption Algorithm using genetic programming
|
|
2016 |
|
|
[7]
|
Randomness analysis in authenticated encryption systems
|
|
2016 |
|
|
[8]
|
TEA analysis using genetic programming
|
|
2015 |
|
|
[9]
|
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits
|
|
E-Business and Telecommunications,
2014 |
|
|
[10]
|
Applications of Genetic Algorithms in Cryptology
|
|
Proceedings of the Third International Conference on Soft Computing for Problem Solving. Springer India,
2014 |
|
|
[11]
|
Towards cryptographic function distinguishers with evolutionary circuits
|
|
10th International Conference on Security and Cryptography, Laboratory of Security and Applied Cryptography, Masaryk University,
2013 |
|
|
[12]
|
On the origin of yet another channel
|
|
Security Protocols XXI,
2013 |
|
|
[13]
|
The Evolution of Randomess Testing
|
|
2013 |
|
|
[14]
|
An evolutionary computation attack on one-round TEA
|
|
Procedia Computer Science,
2011 |
|
|