2007
DOI: 10.1007/978-3-540-71078-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography and Cryptanalysis Through Computational Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 111 publications
0
9
0
1
Order By: Relevance
“…Many CI methods [15], such as Artificial Neural Networks (ANNs), Evolutionary Computation (EC), Genetic Algorithms (GAs), Ant Colony Optimization (ACO), etc., have been used to design or analyze the cryptography. For example, Sardha Wijesoma et al [16] adopted the genetic algorithm of CI to perform the on-line signature verification that yields good results with moderate complexity.…”
Section: Efficiency Analysismentioning
confidence: 99%
“…Many CI methods [15], such as Artificial Neural Networks (ANNs), Evolutionary Computation (EC), Genetic Algorithms (GAs), Ant Colony Optimization (ACO), etc., have been used to design or analyze the cryptography. For example, Sardha Wijesoma et al [16] adopted the genetic algorithm of CI to perform the on-line signature verification that yields good results with moderate complexity.…”
Section: Efficiency Analysismentioning
confidence: 99%
“…Benjamin 8 applied evolutionary algorithms in cryptanalysis of Playfair cipher but could not get good results due to implementation issues. The work of Laskari 9 , et al is considered as an important effort for solving crypto problems by applying computational intelligence (CI). Authors formulated three discrete optimization problems as crypto-problems of public key cryptosystem and solved them by applying evolutionary methods.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A survey of AI techniques for development of cipher analysis has been demonstrated in [7], here main objective was to investigate usage of advanced AI techniques in cryptography and they found that AI based security measures can be developed but their performance will depends on the data representation and problem formulation.…”
Section: Review Of Literaturementioning
confidence: 99%