peer reviewedCryptographic hash functions are fundamental primitives in modern cryptography and have many security applications (data integrity checking, cryptographic protocols, digital signatures, pseudo random number generators etc.). At the same time novel hash functions are designed (for instance in the framework of the SHA-3 contest organized by the National Institute of Standards and Technology (NIST)), the cryptanalysts exhibit a set of statistical metrics (propagation criterion, frequency analysis etc.) able to assert the quality of new proposals. Also, rules to design "good" hash functions are now known and are followed in every reasonable proposal of a new hash scheme. This article investigates the ways to build on this experimen...
Stream ciphers are beneficial because of their efficiency, speed, and low resource utilization. Howe...
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm usin...
Grammatical evolution allows us to automate creating solutions to various problems in arbitrary prog...
: Cryptographic hash functions are fundamental primitives in modern cryptography and have many secu...
Proceedings of the 8th annual conference on Genetic and evolutionary computation. Seattle, Washingto...
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of n...
In the last years, a number of serious flaws and vulnerabilities have been found in classic cryptogr...
Noncryptographic hash functions have an immense number of important practical applications owing to ...
This thesis deals with automated design of hash functions using Cartesian genetic programming. The c...
Genetic algorithms (aka GA's) are a robust global search strategy that ignore local minima and irrel...
Hash tables are fast associative array implementations which became part of modern world of informat...
Genetic Algorithm (GA) is a popular desire for the researchers for creating an automated cryptanalys...
The goal of this bachelor's thesis is to compare various selection methods used in cartesian genetic...
Genetic algorithms (GAs) are a class of optimization algorithms. GAs attempt to solve problems throu...
© 2015 Elsevier B.V. All rights reserved. Boolean functions represent an important primitive in the ...
Stream ciphers are beneficial because of their efficiency, speed, and low resource utilization. Howe...
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm usin...
Grammatical evolution allows us to automate creating solutions to various problems in arbitrary prog...
: Cryptographic hash functions are fundamental primitives in modern cryptography and have many secu...
Proceedings of the 8th annual conference on Genetic and evolutionary computation. Seattle, Washingto...
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of n...
In the last years, a number of serious flaws and vulnerabilities have been found in classic cryptogr...
Noncryptographic hash functions have an immense number of important practical applications owing to ...
This thesis deals with automated design of hash functions using Cartesian genetic programming. The c...
Genetic algorithms (aka GA's) are a robust global search strategy that ignore local minima and irrel...
Hash tables are fast associative array implementations which became part of modern world of informat...
Genetic Algorithm (GA) is a popular desire for the researchers for creating an automated cryptanalys...
The goal of this bachelor's thesis is to compare various selection methods used in cartesian genetic...
Genetic algorithms (GAs) are a class of optimization algorithms. GAs attempt to solve problems throu...
© 2015 Elsevier B.V. All rights reserved. Boolean functions represent an important primitive in the ...
Stream ciphers are beneficial because of their efficiency, speed, and low resource utilization. Howe...
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm usin...
Grammatical evolution allows us to automate creating solutions to various problems in arbitrary prog...