-
1
-
-
84863321841
-
Cryptanalysis of simplified data encryption standard via optimisation heuristics
-
January
-
Nalini N and Raghavendra Rao G, "Cryptanalysis of Simplified Data Encryption Standard via Optimisation Heuristics", International Journal of Computer Science and Network Security, Vol.6, No.1B, p.240-246, January 2006.
-
(2006)
International Journal of Computer Science and Network Security
, vol.6
, Issue.1 B
, pp. 240-246
-
-
Nalini, N.1
Raghavendra Rao, G.2
-
2
-
-
34047158699
-
Attacks of simple block ciphers via efficient heuristics
-
DOI 10.1016/j.ins.2007.01.007, PII S0020025507000369
-
Nalini N and Raghavendra Rao G, "Attacks of simple block ciphers via efficient heuristics", Journal of Information Sciences, Vol.177, No. 12, p.2553-2569, June 2007, doi:10.1016/j.ins.2007.01.007. (Pubitemid 46528940)
-
(2007)
Information Sciences
, vol.177
, Issue.12
, pp. 2553-2569
-
-
Nalini, N.1
Raghavendra Rao, G.2
-
3
-
-
84919407120
-
Randomness analysis of block cipher
-
Budi Sulistyo, Budi Rahardjo, Dimitri Mahayana and Carmadi Machbub, "Randomness Analysis of Block Cipher", International Journal of Secure Digital Information Age, Vol. 1,No.2,9 pages, 2009.
-
(2009)
International Journal of Secure Digital Information Age
, vol.1
, Issue.2
, pp. 9
-
-
Sulistyo, B.1
Rahardjo, B.2
Mahayana, D.3
Machbub, C.4
-
4
-
-
77954415230
-
Scalable pp-1 block cipher
-
doi 10.2478/v10006-010-0030-6
-
Krzysztof Bucholc, Krzysztof Chmiel, Anna Grocholewska-Czurylo, Ewa Idzikowska, Izabela Janicka-Lipska and Janusz Stoklosa, "Scalable pp-1 block cipher", Int. J. Appl. Math. Comput. Sci., 2010, Vol. 20, No. 2, p.401-411, doi 10.2478/v10006-010-0030-6.
-
(2010)
Int. J. Appl. Math. Comput. Sci.
, vol.20
, Issue.2
, pp. 401-411
-
-
Bucholc, K.1
Chmiel, K.2
Grocholewska-Czurylo, A.3
Idzikowska, E.4
Janicka-Lipska, I.5
Stoklosa, J.6
-
5
-
-
0028428941
-
The data encryption standard (DES) and its strength against attacks
-
May, doi.10.1147/rd.383.0243
-
Coppersmith D, "The Data Encryption Standard (DES) and its strength against attacks", IBM Journal of Research and Development, Vol. 38, No.3, p.243-250, May 1994,doi.10.1147/rd.383.0243.
-
(1994)
IBM Journal of Research and Development
, vol.38
, Issue.3
, pp. 243-250
-
-
Coppersmith, D.1
-
6
-
-
77952514019
-
Attack of against simplified data encryption standard cipher system using neural networks
-
Khaled M. Alallayah, Waiel F. Abd El-Wahed, Mohamed Amin and Alaa H. Alhamami, "Attack of Against Simplified Data Encryption Standard Cipher System Using Neural Networks", Journal of Computer Science, Vol.6, No.1, p. 29-35, 2010.
-
(2010)
Journal of Computer Science
, vol.6
, Issue.1
, pp. 29-35
-
-
Alallayah, K.M.1
Abd El-Wahed, W.F.2
Amin, M.3
Alhamami, A.H.4
-
7
-
-
77955763039
-
Genetic algorithm For finding the key's length and cryptanalysis of the permutation cipher
-
Aleksey Gorodilov and Vladimir Morozenko, "Genetic algorithm For Finding The Key's Length and Cryptanalysis of the Permutation Cipher", International Journal of Information Theories & Applications, Vol.15,No.1, p.94-99,2008.
-
(2008)
International Journal of Information Theories & Applications
, vol.15
, Issue.1
, pp. 94-99
-
-
Gorodilov, A.1
Morozenko, V.2
-
8
-
-
28044467996
-
Evolutionary computation based cryptanalysis: A first study
-
DOI 10.1016/j.na.2005.03.004, PII S0362546X05002907
-
E.C. Laskari, G.C. Meletiou, Y.C. Stamatioud and M.N. Vrahatis, "Evolutionary computation based cryptanalysis: A first study", Journal of nonlinear analysis, Vol.63, No.5-7, p.e823-e830, 2005. (Pubitemid 41691235)
-
(2005)
Nonlinear Analysis, Theory, Methods and Applications
, vol.63
, Issue.5-7
-
-
Laskari, E.C.1
Meletiou, G.C.2
Stamatiou, Y.C.3
Vrahatis, M.N.4
-
9
-
-
84863309665
-
Cryptanalysis of block ciphers via improvised particle swarm optimization and extended simulated annealing techniques
-
May
-
Nalini N and Raghavendra Rao G, "Cryptanalysis of Block Ciphers via Improvised Particle Swarm Optimization and Extended Simulated Annealing Techniques", International Journal of Network Security, Vol.6, No.3, p.342-353, May 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.3
, pp. 342-353
-
-
Nalini, N.1
Raghavendra Rao, G.2
-
10
-
-
77955740925
-
A genetic algorithm for cryptanalysis with application to DES-like systems
-
Mar
-
Hasan Mohammed Hasan Husei, Bayoumi I. Bayoumi,Fathy Saad Holail, Bahaa Eldin M. Hasan and Mohammed Z. Abd El-Mageed, " A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems", International Journal of Network Security, Vol.8, No.2, p.177-186, Mar. 2009.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.2
, pp. 177-186
-
-
Husei, H.M.H.1
Bayoumi, B.I.2
Holail, F.S.3
Bahaa Eldin, M.4
Hasan Mohammed, Z.5
El-Mageed, A.6
-
11
-
-
79958280063
-
Cryptanalysis of SDES via evolutionary computation techniques (IJCSIS)
-
May
-
Poonam Garg, Cryptanalysis of SDES via Evolutionary Computation Techniques", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 1, No. 1,7 pages, May 2009.
-
(2009)
International Journal of Computer Science and Information Security
, vol.1
, Issue.1
, pp. 7
-
-
Garg, P.1
-
12
-
-
84863314298
-
Nomadic genetic algorithm for cryptanalysis of des 16
-
June
-
Siva Sathya S, Chithralekha T and Ananda Kumar P, "Nomadic Genetic Algorithm for Cryptanalysis of DES 16", International Journal of Computer Theory and Engineering, Vol. 2, No. 3, p. 411-415, June 2010.
-
(2010)
International Journal of Computer Theory and Engineering
, vol.2
, Issue.3
, pp. 411-415
-
-
Siva Sathya, S.1
Chithralekha, T.2
Ananda Kumar, P.3
-
13
-
-
79958260960
-
Cryptanalysis of DES using computational intelligence
-
Vimalathithan R and Valarmathi M.L, "Cryptanalysis of DES using Computational Intelligence", WSEAS Transactions On Computers ,Vol. 10,No.7, p.210-219, 2011
-
(2011)
WSEAS Transactions On Computers
, vol.10
, Issue.7
, pp. 210-219
-
-
Vimalathithan, R.1
Valarmathi, M.L.2
-
14
-
-
70350062233
-
Cryptanalysis of a feistal type block cipher by feed forward neural network using right sigmoidal signals
-
Srinivasa Rao K V, Rama Krishna M and Bujji Babu D, "Cryptanalysis of a Feistal Type Block Cipher by Feed Forward Neural Network Using Right Sigmoidal Signals", International Journal of Soft Computing, Vol.4, No.3, p.131-135, 2009.
-
(2009)
International Journal of Soft Computing
, vol.4
, Issue.3
, pp. 131-135
-
-
Srinivasa Rao, K.V.1
Rama Krishna, M.2
Bujji Babu, D.3
-
15
-
-
84863335382
-
Decipherment of substitution cipher using enhanced probability distribution
-
August
-
Apparao Naidu G, Bhadri Raju MSVS, Vishnu Vardhan B and Pratap Reddy L," Decipherment of Substitution Cipher using Enhanced Probability Distribution", International Journal of Computer Applications, Vol.5, No.8,pp.34-40, August 2010.
-
(2010)
International Journal of Computer Applications
, vol.5
, Issue.8
, pp. 34-40
-
-
Apparao Naidu, G.1
Bhadri Raju, M.S.V.S.2
Vishnu Vardhan, B.3
Pratap Reddy, L.4
-
16
-
-
84863329349
-
Developing a block-cipher-key generator using philosophy of data fusion technique
-
May
-
Soukaena H. Hashem, Mohammad A. AL-Hamami and Alaa H. AL-Hamami, "Developing a Block-Cipher-Key Generator Using Philosophy of Data Fusion Technique", Journal of Emerging Trends in Computing and Information Sciences,Vol.2, No.5,p.222-227, May 2011.
-
(2011)
Journal of Emerging Trends in Computing and Information Sciences
, vol.2
, Issue.5
, pp. 222-227
-
-
Hashem, S.H.1
Al-Hamami, M.A.2
Al-Hamami, A.H.3
-
17
-
-
84863325993
-
An innovative approach to enhance the security of data encryption scheme
-
June
-
Ojha D B, Ramveer Singh, Ajay Sharma, Awakash Mishra and Swati garg, "An Innovative Approach to Enhance the Security of Data Encryption Scheme", International Journal of Computer Theory and Engineering, Vol. 2, No. 3,p.380-383, June 2010.
-
(2010)
International Journal of Computer Theory and Engineering
, vol.2
, Issue.3
, pp. 380-383
-
-
Ojha, D.B.1
Singh, R.2
Sharma, A.3
Mishra, A.4
Garg, S.5
-
18
-
-
33846373388
-
Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
-
DOI 10.1016/j.amc.2005.11.176, PII S0096300306004851
-
Laskari E C, Meletiou G C, Stamatiou Y C and Vrahatis M N, "Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers", Journal of Applied Mathematics and Computation-AMC , Vol.184, No. 1, p. 63-72, 2007,doi: 10.1016/j.amc.2005.11.176. (Pubitemid 46135697)
-
(2007)
Applied Mathematics and Computation
, vol.184
, Issue.1 SPEC. ISS.
, pp. 63-72
-
-
Laskari, E.C.1
Meletiou, G.C.2
Stamatiou, Y.C.3
Vrahatis, M.N.4
-
19
-
-
60349092746
-
Genetic algorithm and tabu search attack on the mono-alphabetic subsitution cipher in adhoc networks
-
Verma A K,Mayank Dave and Joshi R C, "Genetic Algorithm and Tabu Search Attack on the Mono-Alphabetic Subsitution Cipher in Adhoc Networks", Journal of Computer Science,Vol.3,No.3,p.134-137,2007.
-
(2007)
Journal of Computer Science
, vol.3
, Issue.3
, pp. 134-137
-
-
Verma, A.K.1
Dave, M.2
Joshi, R.C.3
-
20
-
-
84863309659
-
A comparison of memetic & tabu search for the cryptanalysis of simplified data encryption standard algorithm
-
Apr
-
Poonam Garg," A Comparison of Memetic & Tabu Search for the Cryptanalysis of Simplified Data Encryption Standard Algorithm", Journal of Theoretical and Applied Information Technology, Vol.4, No.4, p.360-366, Apr 2008.
-
(2008)
Journal of Theoretical and Applied Information Technology
, vol.4
, Issue.4
, pp. 360-366
-
-
Garg, P.1
-
21
-
-
80052824798
-
Design and evaluation of two symmetrical evolutionist-based ciphering algorithms
-
February, doi=10.1.1.103.5113
-
Omary F, Tragha A, Bellaachia A and Mouloudi A, "Design and Evaluation of Two Symmetrical Evolutionist-Based Ciphering Algorithms", International Journal of Computer Science and Network Security,Vol.7, No.2,p.181-190, February 2007, doi=10.1.1.103.5113
-
(2007)
International Journal of Computer Science and Network Security
, vol.7
, Issue.2
, pp. 181-190
-
-
Omary, F.1
Tragha, A.2
Bellaachia, A.3
Mouloudi, A.4
-
22
-
-
84919409881
-
An Ordeal random data encryption scheme (ORDES)
-
Ramveer Singh and Deo Brat Ojha, "An Ordeal Random Data Encryption Scheme (ORDES)", International Journal of Engineering Science and Technology, Vol. 2,No.11, p.6349-6360,2010.
-
(2010)
International Journal of Engineering Science and Technology
, vol.2
, Issue.11
, pp. 6349-6360
-
-
Singh, R.1
Ojha, D.B.2
-
23
-
-
84863329719
-
The data encryption standard thirty four years later: An overview
-
October
-
Kenekayoro Patrick T., "The data encryption standard thirty four years later: An overview", African Journal of Mathematics and Computer Science Research, Vol.3, No.10, p. 267-269, October 2010.
-
(2010)
African Journal of Mathematics and Computer Science Research
, vol.3
, Issue.10
, pp. 267-269
-
-
Kenekayoro Patrick, T.1
-
24
-
-
0024012695
-
The data encryption Standard: Past and Future
-
DOI 10.1109/5.4441
-
Smid, M.E. and Branstad, D.K., "The Data Encryption Standard: Past and Future", Proceedings of the IEEE, Vol.76, No. 5, p.550-559, May 1988, doi: 10.1109/5.4441. (Pubitemid 18665558)
-
(1988)
Proceedings of the IEEE
, vol.76
, Issue.5
, pp. 550-559
-
-
Smid, M.E.1
Branstad, D.K.2
-
25
-
-
84863324337
-
Spiking neurons with ASNN BASED-Methods for the neural block cipher
-
August, doi: 10.5121/ijcsit.2010.2412
-
Saleh Ali K. and Al-Omari Putra Sumari, "Spiking Neurons with ASNN BASED-Methods for the Neural Block Cipher", International journal of computer science & information Technology, Vol.2, No.4, p.138-148, August 2010, doi: 10.5121/ijcsit.2010.2412.
-
(2010)
International Journal of Computer Science & Information Technology
, vol.2
, Issue.4
, pp. 138-148
-
-
Saleh Ali, K.1
Putra Sumari, A.-O.2
-
26
-
-
77955789844
-
Design of a two-dimensional recursive filter using the bees algorithm
-
August, doi: 10.1007/s11633-010-0520-x
-
D. T. Pham and Ebubekir Koc, "Design of a Two-dimensional Recursive Filter Using the Bees Algorithm", International Journal of Automation and Computing, Vol.7, No.3, p.399-402, August 2010, doi: 10.1007/s11633-010-0520-x.
-
(2010)
International Journal of Automation and Computing
, vol.7
, Issue.3
, pp. 399-402
-
-
Pham, D.T.1
Koc, E.2
-
28
-
-
84858658032
-
Improved cuckoo search algorithm for feed forward neural network training
-
July, doi : 10.5121/ijaia.2011.2304
-
Ehsan Valian, Shahram Mohanna and Saeed Tavakoli, "Improved Cuckoo Search Algorithm For Feed forward Neural Network Training", International Journal of Artificial Intelligence & Applications (IJAIA), Vol.2, No.3,p.36-43,July 2011, doi : 10.5121/ijaia.2011.2304
-
(2011)
International Journal of Artificial Intelligence & Applications (IJAIA)
, vol.2
, Issue.3
, pp. 36-43
-
-
Valian, E.1
Mohanna, S.2
Tavakoli, S.3
-
29
-
-
67349149522
-
-
Technical Note, Manufacturing Engineering Centre, Cardiff University, UK
-
Pham DT, Ghanbarzadeh A, Koc E, Otri S, Rahim S and Zaidi M., "The Bees Algorithm" Technical Note, Manufacturing Engineering Centre, Cardiff University, UK, 2005
-
(2005)
The Bees Algorithm
-
-
Pham, D.T.1
Ghanbarzadeh, A.2
Koc, E.3
Otri, S.4
Rahim, S.5
Zaidi, M.6
-
30
-
-
79958224650
-
Bacterial foraging optimization
-
K. M. Passino, "Bacterial Foraging Optimization", International Journal of Swarm Intelligence Research, Vol.1, No.1, p.1-16, 2010.
-
(2010)
International Journal of Swarm Intelligence Research
, vol.1
, Issue.1
, pp. 1-16
-
-
Passino, K.M.1
|