메뉴 건너뛰기




Volumn , Issue , 2006, Pages 192-199

Wheedham: An automatically designed block cipher by means of genetic programming

Author keywords

[No Author keywords available]

Indexed keywords

BLOCK CIPHERS; FEISTEL NETWORK; WHEEDHAM;

EID: 34547254510     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (24)

References (27)
  • 1
    • 0001820140 scopus 로고
    • Cryptography and Computer Privacy
    • May
    • H. Feistel, "Cryptography and Computer Privacy,", in Scientific American, Vol. 228, No. 5, May 1973, pp. 15-23.
    • (1973) Scientific American , vol.228 , Issue.5 , pp. 15-23
    • Feistel, H.1
  • 2
    • 34547255839 scopus 로고    scopus 로고
    • National Bureau of Standards, NBS FIPS PUB 46, Data Encryption. Standard, National Bureau of Standards, U.S. Department of Commerce, Jan 1977.
    • National Bureau of Standards, NBS FIPS PUB 46, "Data Encryption. Standard," National Bureau of Standards, U.S. Department of Commerce, Jan 1977.
  • 3
    • 84958635277 scopus 로고
    • Fast Data Encipherment Algorithm FEAL
    • Advances in Cryptology, EUROCRYPT '87, Springer-Verlag
    • A. Shimizu and S. Miyaguchi, "Fast Data Encipherment Algorithm FEAL," in Advances in Cryptology - EUROCRYPT '87, Lecture Notes in Computer Science, Vol. 304, Springer-Verlag, 1988, pp. 267-278.
    • (1988) Lecture Notes in Computer Science , vol.304 , pp. 267-278
    • Shimizu, A.1    Miyaguchi, S.2
  • 4
    • 34547242858 scopus 로고
    • Cryptographic Protection for Data Processing Systems
    • GOST, Government Committee of the USSR for Standards
    • GOST, Gosudarstvennyi Standard 28147-89, "Cryptographic Protection for Data Processing Systems," Government Committee of the USSR for Standards, 1989.
    • (1989)
  • 5
    • 85028757148 scopus 로고
    • Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI
    • Advances in Cryptology, ASIACRYPT '91, Springer-Verlag
    • L. Brown, M. Kwan, J. Pieprzyk, and J. Seberry, "Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI," in Advances in Cryptology - ASIACRYPT '91, Lecture Notes in Computer Science, Vol. 739, Springer-Verlag, 1993, pp. 36-50.
    • (1993) Lecture Notes in Computer Science , vol.739 , pp. 36-50
    • Brown, L.1    Kwan, M.2    Pieprzyk, J.3    Seberry, J.4
  • 8
    • 84948990100 scopus 로고
    • The RC5 Encryption Algorithm
    • Fast Software Encryption, Second International Workshop Proceedings, Springer-Verlag
    • R.L. Rivest, "The RC5 Encryption Algorithm," in Fast Software Encryption, Second International Workshop Proceedings, Lecture Notes in Computer Science, Vol. 1008, Springer-Verlag, 1995, pp. 86-96.
    • (1995) Lecture Notes in Computer Science , vol.1008 , pp. 86-96
    • Rivest, R.L.1
  • 9
    • 34547245982 scopus 로고    scopus 로고
    • R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, The RC6 Block Cipher, v.1.1, August 20, 1998.
    • R. L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin, "The RC6 Block Cipher," v.1.1, August 20, 1998.
  • 10
    • 0023984964 scopus 로고
    • How to Construct Pseudorandom Permutations and Pseudorandom Functions
    • M. Luby and C. Rackoff, "How to Construct Pseudorandom Permutations and Pseudorandom Functions," in SIAM Journal on Computing, Vol. 17, 1988, pp. 373-386.
    • (1988) SIAM Journal on Computing , vol.17 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 11
    • 84958955327 scopus 로고    scopus 로고
    • Unbalanced Feistel Networks and Block-Cipher Design
    • Fast Software Encryption, Third International Workshop Proceedings, Springer-Verlag
    • B. Schneier and J. Kelsey, "Unbalanced Feistel Networks and Block-Cipher Design." in Fast Software Encryption, Third International Workshop Proceedings, Lecture Notes in Computer Science, pp. 121-144, Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , pp. 121-144
    • Schneier, B.1    Kelsey, J.2
  • 13
    • 85011285633 scopus 로고
    • The strict avalanche criterion: Spectral properties of boolean functions and an extended definition
    • CRYPTO 88, Springer-Verlag New York, Inc
    • R. Forré, "The strict avalanche criterion: spectral properties of boolean functions and an extended definition," in CRYPTO 88, Lecture Notes in Computer Science, pp. 450-468. Springer-Verlag New York, Inc., 1990.
    • (1990) Lecture Notes in Computer Science , pp. 450-468
    • Forré, R.1
  • 16
    • 84869815133 scopus 로고
    • TEA, a tiny encryption algorithm
    • Springer-Verlag
    • D. J. Wheeler and R. M. Needham, "TEA, a tiny encryption algorithm," in Lecture Notes in Computer Science, Vol. 1008, pp. 363-369. Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1008 , pp. 363-369
    • Wheeler, D.J.1    Needham, R.M.2
  • 18
    • 0031599142 scopus 로고    scopus 로고
    • M. Matsumoto, T. Nishimura, Mersenne Twister: A 623-dimensionally equidistributed uniform pseudorandom number generator, ACM Trans. on Modeling and Computer Simulation 8, No. 1, January pp.3-30, 1998
    • M. Matsumoto, T. Nishimura, "Mersenne Twister: A 623-dimensionally equidistributed uniform pseudorandom number generator", ACM Trans. on Modeling and Computer Simulation Vol. 8, No. 1, January pp.3-30, 1998
  • 20
    • 84992720189 scopus 로고
    • Cryptography with cellular automata
    • Advances in Cryptology: Crypto '85 Proceedings
    • S. Wolfram, "Cryptography with cellular automata", Advances in Cryptology: Crypto '85 Proceedings, LNCS, vol. 218, pp 429-432, 1986.
    • (1986) LNCS , vol.218 , pp. 429-432
    • Wolfram, S.1
  • 21
    • 84958983410 scopus 로고    scopus 로고
    • A cellular automaton based fast one-way hash function suitable for hardware implementation
    • M. Mihaljevic, Y. Zheng and H. Imai, "A cellular automaton based fast one-way hash function suitable for hardware implementation", Lecture Notes in Computer Science, vol. 1431, pp. 217-233, 1998
    • (1998) Lecture Notes in Computer Science , vol.1431 , pp. 217-233
    • Mihaljevic, M.1    Zheng, Y.2    Imai, H.3
  • 22
    • 34547326435 scopus 로고    scopus 로고
    • S. Hirose and S. Yoshida, A. one-way hash function based on a two-dimensional cellular automaton, The 20th Symposium on Information Theory and Its Applications (SITA97), Matsuyama, Japan, Dec. 1997, Proc. 1, pp. 213-216.
    • S. Hirose and S. Yoshida, "A. one-way hash function based on a two-dimensional cellular automaton", The 20th Symposium on Information Theory and Its Applications (SITA97), Matsuyama, Japan, Dec. 1997, Proc. vol. 1, pp. 213-216.
  • 23
    • 0028750092 scopus 로고
    • Theory and applications of cellular automata in cryptography', IEEE
    • S. Nandi et al. '"Theory and applications of cellular automata in cryptography'", IEEE Transactions on Computers, Vol. 43, pp. 1346-1357, 1994
    • (1994) Transactions on Computers , vol.43 , pp. 1346-1357
    • Nandi, S.1
  • 24
    • 33750272503 scopus 로고    scopus 로고
    • An improved key stream generator based on the programmable cellular automata
    • M. J. Mihaljevic "'An improved key stream generator based on the programmable cellular automata'", Lecture Notes in Computer Science, Vol. 1334, pp. 181-191, 1997
    • (1997) Lecture Notes in Computer Science , vol.1334 , pp. 181-191
    • Mihaljevic, M.J.1
  • 26
    • 0347666758 scopus 로고    scopus 로고
    • G. Marsaglia, W. W. Tsang 'Some Difficult-to-pass Tests of Randomness', Journal of Statistical Software, 7, 2002, Issue 3
    • G. Marsaglia, W. W. Tsang '"Some Difficult-to-pass Tests of Randomness'", Journal of Statistical Software, Volume 7, 2002, Issue 3
  • 27
    • 34547329200 scopus 로고    scopus 로고
    • A. L. Rukhin, J. Soto, J. R. Nechvatal, M. Smid, E. B. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, N. A. Heckert, J. F. Dray, S. Vo 'A Statistical Test Suite for Random, and Pseudorandom Number Generators for Cryptographic Application' NIST SP 800-22, U.S. Government Printing Office, Washington:2000, CODEN: NSPUE2
    • A. L. Rukhin, J. Soto, J. R. Nechvatal, M. Smid, E. B. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, N. A. Heckert, J. F. Dray, S. Vo "'A Statistical Test Suite for Random, and Pseudorandom Number Generators for Cryptographic Application'" NIST SP 800-22, U.S. Government Printing Office, Washington:2000, CODEN: NSPUE2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.