2016
DOI: 10.1016/j.pisc.2016.04.098
|View full text |Cite
|
Sign up to set email alerts
|

Applying Cuckoo Search for analysis of LFSR based cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…A Le ´vy flight can be described as a random walk with move lengths pulled from a heavy-tailed distribution, P(l) * l −u with power-law exponent 1 < u < 3 [1][2][3][4] (Fig 1). Levy flights model the behaviour of phenomena in several areas including, but not limited to, finance [5][6][7], criminology [8,9], optimization algorithms and cryptography [10][11][12][13], epidemiology [14][15][16], earthquake analysis [17], and physics and astronomy [18][19][20][21][22]. In behavioural ecology, Levy flights have also been shown to be an efficient searching strategy for foragers [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…A Le ´vy flight can be described as a random walk with move lengths pulled from a heavy-tailed distribution, P(l) * l −u with power-law exponent 1 < u < 3 [1][2][3][4] (Fig 1). Levy flights model the behaviour of phenomena in several areas including, but not limited to, finance [5][6][7], criminology [8,9], optimization algorithms and cryptography [10][11][12][13], epidemiology [14][15][16], earthquake analysis [17], and physics and astronomy [18][19][20][21][22]. In behavioural ecology, Levy flights have also been shown to be an efficient searching strategy for foragers [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…Din 16 , et al proposed cuckoo search based swarm method in analysis of LFSR-based cipher to find initial states of considered LFSR. The authors also applied GA for computing initial states of considered three LFSRs of Geffe Generator based stream cipher 17 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…A Lévy flight can be described as a random walk with move lengths pulled from a heavy-tailed distribution, P ( l ) ∼ l − u with power-law exponent 1 < u < 3 [14] (Fig 1). Levy flights model the behaviour of phenomena in several areas including, but not limited to, finance [5–7], criminology [8, 9],optimization algorithms and cryptography [1013], epidemiology [1416], earthquake analysis [17], and physics and astronomy [1822]. In behavioural ecology, Levy flights have also been shown to be an efficient searching strategy for foragers [24].…”
Section: Introductionmentioning
confidence: 99%
“…Levy flights model the behaviour of phenomena in several areas including, but not limited to, finance [5][6][7], criminology [8,9],optimization algorithms and cryptography [10][11][12][13], epidemiology [14][15][16], earthquake analysis [17], and physics and astronomy [18][19][20][21][22]. In behavioural ecology, Levy flights have also been shown to be an efficient searching strategy for foragers [2][3][4].…”
Section: Introductionmentioning
confidence: 99%