2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) 2016
DOI: 10.1109/wispnet.2016.7566557
|View full text |Cite
|
Sign up to set email alerts
|

An efficient stream cipher using Genetic Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 3 publications
0
11
0
1
Order By: Relevance
“…Different genetic algorithms were proposed to resolve this problem, as Jones and Beltramo's genetic algorithm, Falkenauer's one [5], and by 2000 William A.Green proposed a better one named Eager Breeder Greene [6]. Later, genetic and evolutionist algorithms were used in the design of cryptographic algorithms to reach better security like in [7][8][9][10][11]. In [3], [12], [13], and [14], Omary proposed an evolutionist-based encryption scheme and extended versions that aim to substitute the plaintext's characters to change their occurrence frequency.…”
Section: Related Workmentioning
confidence: 99%
“…Different genetic algorithms were proposed to resolve this problem, as Jones and Beltramo's genetic algorithm, Falkenauer's one [5], and by 2000 William A.Green proposed a better one named Eager Breeder Greene [6]. Later, genetic and evolutionist algorithms were used in the design of cryptographic algorithms to reach better security like in [7][8][9][10][11]. In [3], [12], [13], and [14], Omary proposed an evolutionist-based encryption scheme and extended versions that aim to substitute the plaintext's characters to change their occurrence frequency.…”
Section: Related Workmentioning
confidence: 99%
“…In Flipping of Bits one or more bits are converted into 0 to 1 or 1 to 0. In Boundary Mutation randomly upper or lower block in swapped in chromosome [9]. …”
Section: B Mutationmentioning
confidence: 99%
“…Ankit et al [9] generated the key for stream cipher with the help of natural selection process. The genetic operations were repeated until fitness value of any chromosome is less than threshold.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Reproduksi Proses menghasilkan keturunan individu di dalam populasi dilakukan dengan proses pindah silang dan proses mutasi. Proses pemilihan dua parent dari suatu populasi secara random atau proses pindah silang untuk menghasilkan kromosom baru disebut proses crossover (Kumar and Chatterjee, 2016). Sedangkan, proses mutasi merupakan proses menciptakan individu baru secara random (Zhou and Song, 2016).…”
Section: Siklus Algoritma Genetikaunclassified