메뉴 건너뛰기




Volumn 177, Issue 12, 2007, Pages 2553-2569

Attacks of simple block ciphers via efficient heuristics

Author keywords

Cryptanalysis; DES; Genetic algorithms; Heuristic algorithms; Particle swarm optimisation; SDES; Simulated annealing with thermostatistical persistency; Tabu search

Indexed keywords

CRYPTOGRAPHY; GENETIC ALGORITHMS; HEURISTIC ALGORITHMS; TABU SEARCH;

EID: 34047158699     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2007.01.007     Document Type: Article
Times cited : (12)

References (18)
  • 1
    • 34047095971 scopus 로고    scopus 로고
    • D. Bethany, Genetic algorithms in cryptography, Master of Science Thesis, Rochester Institute of Technology, 2004.
  • 2
    • 26444604938 scopus 로고    scopus 로고
    • E. Biham, O. Dunkelman, N. Keller, New combined attacks on block ciphers, in: Proceedings of Fast Software Encryption 2005 Conference, LNCS 3557, 2005, pp. 126-144.
  • 3
    • 0042910823 scopus 로고
    • Thermostatistical persistency: a powerful improving concept for simulated annealing algorithms
    • Chardaire P., Lutton J.L., and Sutter A. Thermostatistical persistency: a powerful improving concept for simulated annealing algorithms. European Journal of Operations Research 86 (1995) 565-579
    • (1995) European Journal of Operations Research , vol.86 , pp. 565-579
    • Chardaire, P.1    Lutton, J.L.2    Sutter, A.3
  • 4
    • 1342285565 scopus 로고    scopus 로고
    • Cryptanalysis of short secret exponents modulo RSA primes
    • Chen C.-Y., Ku C.-Y., and Yen D.C. Cryptanalysis of short secret exponents modulo RSA primes. Information Sciences 160 (2004) 225-233
    • (2004) Information Sciences , vol.160 , pp. 225-233
    • Chen, C.-Y.1    Ku, C.-Y.2    Yen, D.C.3
  • 8
    • 0029535737 scopus 로고    scopus 로고
    • J. Kennedy, R. Eberhart, Particle swarm optimisation, in Proceedings of the IEEE International Conference on Neural Networks, 1995, pp. 1942-1948.
  • 11
    • 33646825846 scopus 로고    scopus 로고
    • A simplified data encryption standard algorithm
    • Schaefer E. A simplified data encryption standard algorithm. Cryptologia 20 (1996) 77-84
    • (1996) Cryptologia , vol.20 , pp. 77-84
    • Schaefer, E.1
  • 13
    • 33751229614 scopus 로고    scopus 로고
    • Cryptanalysis of tripartite and multiparty authenticated key agreement protocols
    • Shim K.-A., and Woo S.S. Cryptanalysis of tripartite and multiparty authenticated key agreement protocols. Information Sciences 177 (2007) 1143-1151
    • (2007) Information Sciences , vol.177 , pp. 1143-1151
    • Shim, K.-A.1    Woo, S.S.2
  • 14
    • 84912000392 scopus 로고
    • Cryptanalysis of knapsack ciphers using genetic algorithms
    • Spillman R. Cryptanalysis of knapsack ciphers using genetic algorithms. Cryptologia 17 (1993) 367-377
    • (1993) Cryptologia , vol.17 , pp. 367-377
    • Spillman, R.1
  • 15
    • 84912009124 scopus 로고
    • Use of genetic algorithm in the cryptanalysis of simple substitution ciphers
    • Spillman R., Janssen M., Nelson B., and Kepner M. Use of genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia 17 (1993) 30-44
    • (1993) Cryptologia , vol.17 , pp. 30-44
    • Spillman, R.1    Janssen, M.2    Nelson, B.3    Kepner, M.4
  • 18
    • 20444466555 scopus 로고    scopus 로고
    • A simple power analysis attack against the key schedule of the Camellia block cipher
    • Xiao L., and Heys H.M. A simple power analysis attack against the key schedule of the Camellia block cipher. Information Processing Letters (2005) 409-412
    • (2005) Information Processing Letters , pp. 409-412
    • Xiao, L.1    Heys, H.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.