-
1
-
-
34248346024
-
Automated Cryptanalysis of Substitution Ciphers
-
W.S. Forsyth and R. Safavi-Naini. Automated Cryptanalysis of Substitution Ciphers. Cryptologia. vol. 17. No 4. 1993. pp407-418.
-
(1993)
Cryptologia
, vol.17
, Issue.4
, pp. 407-418
-
-
Forsyth, W.S.1
Safavi-Naini, R.2
-
2
-
-
0028755308
-
Automated Cryptanalysis of Transposition Ciphers
-
J.P. Giddy and R. Safavi-Naini Automated Cryptanalysis of Transposition Ciphers. The Computer Journal, (17)4, 1994.
-
(1994)
The Computer Journal
, vol.17
, Issue.4
-
-
Giddy, J.P.1
Safavi-Naini, R.2
-
3
-
-
84969387585
-
On the Norm and Covering Radius of First-order Reed-Muller Codes
-
X.-D Hou. On the Norm and Covering Radius of First-order Reed-Muller Codes. IEEE Transactions on Information Theory, 43(3). May 1983. pp.354-356.
-
(1983)
IEEE Transactions on Information Theory
, vol.43
, Issue.3
, pp. 354-356
-
-
Hou, X.-D.1
-
4
-
-
26444479778
-
Optimization by Simulated Annealing
-
May
-
S. Kirkpatrick and C. D. Gelatt, Jr. and M. P. Vecchi. Optimization by Simulated Annealing. Science, May 1993. pp. 671-680
-
(1993)
Science
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt, C.D.2
Vecchi, M.P.3
-
5
-
-
84957698062
-
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem
-
Springer Verlag LNCS
-
Lars R. Knudsen and Willi Meier. Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. In Advances in Cryptology Eurocrypt '99, Springer Verlag LNCS 1592 pp. 363-374
-
In Advances in Cryptology Eurocrypt '99
, vol.1592
, pp. 363-374
-
-
Knudsen, L.R.1
Meier, W.2
-
6
-
-
84950817396
-
Mathews. The Use of Genetic Algorithms in Cryptanalysis
-
April
-
Robert A J Mathews. The Use of Genetic Algorithms in Cryptanalysis. Cryptologia (17)2, April 1993. pp187-201
-
(1993)
Cryptologia
, vol.17
, Issue.2
, pp. 187-201
-
-
Robert, A.J.1
-
8
-
-
84957625510
-
Heuristic Design of Crypto-graphically Strong Balanced Boolean Functions
-
Springer Verlag LNCS
-
William Millan, Andrew Clark and Ed Dawson. Heuristic Design of Crypto-graphically Strong Balanced Boolean Functions. In Advances in Cryptology EU-ROCRYPT'98, Springer Verlag LNCS 1403. pp.489-499
-
N Advances in Cryptology EU-ROCRYPT'98
, vol.1403
, pp. 489-499
-
-
Millan, W.1
Clark, R.2
Ed, D.3
-
11
-
-
84958971342
-
The Covering Radius of the (21B, 16) Reed-Muller Code is at Least 16276
-
May
-
N.J. Patterson and D.H. Weidermann. The Covering Radius of the (21B, 16) Reed-Muller Code is at Least 16276. IEEE Transactions on Information Theory, 29(3). May 1997. pp.1025-1027.
-
(1997)
IEEE Transactions on Information Theory
, vol.29
, Issue.3
, pp. 1025-1027
-
-
Patterson, N.J.1
Weidermann, D.H.2
-
12
-
-
84912009124
-
The Use of A Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers
-
April
-
Richard Spillman and Mark Janssen and Bob Nelson and Martin Kepner. The Use of A Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers. Cryptologia (17)1. April 1993. pp. 187-201
-
(1993)
Cryptologia
, vol.17
, Issue.1
, pp. 187-201
-
-
Spillman, R.1
Janssen, M.2
Nelson, B.3
Kepner, M.4
|