In this paper we attempt to use a new direction in cryptanalysis of classical crypto systems. The new direction represented by considering some of classical crypto systems, like transposition cipher problem (TCP), as a combinatorial optimization problem (COP), then using the known solving methods of COP, with some modification, to cryptanalysis the TCP. In this work we investigate to use Branch and Bound (BAB) and one of swarm algorithms as a local search method. The main aim of the research presented in this paper is to investigate the use of some optimization methods in the fields of cryptanalysis and cryptographic function generation. These techniques were found to provide a successful method of automated cryptanalysis of a variety of th...
3rd International Conference on Computer Science and Engineering (UBMK) -- SEP 20-23, 2018 -- Saraje...
This paper formalizes a family of prioritized multicriteria optimization problems and assesses the c...
Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryp...
In this paper we attempt to use a new direction in cryptanalysis of classical crypto systems. The ne...
This paper presents state-of-art cryptanalysis studies on attacks of the substitution and transposit...
Cryptography is one of the common approaches to secure private data and cryptanalysis involves break...
Cryptography is one of the common approaches to secure private data and cryptanalysis involves break...
In this thesis, we investigate the applications of two swarm-inspired artificial life optimization t...
Abstract: In this paper three optimization heuristics are presented which can be utilized in attacks...
Abstract: Recent cryptosystems constitute an effective task for cryptanalysis algorithms due to thei...
With the increasing need to protect information digitally, the study of cryptography has become of p...
Possibility of application of ant colony algorithms for realization of the transposition ciphers cry...
Possibility of application of ant colony algorithms for realization of the transposition ciphers cry...
The Merkle-Hellman (MH) cryptosystem is one of the earliest public key cryptosystems, which is intro...
Abstract Genetic algorithms are a population-based Meta heuristics. They have been successfully app...
3rd International Conference on Computer Science and Engineering (UBMK) -- SEP 20-23, 2018 -- Saraje...
This paper formalizes a family of prioritized multicriteria optimization problems and assesses the c...
Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryp...
In this paper we attempt to use a new direction in cryptanalysis of classical crypto systems. The ne...
This paper presents state-of-art cryptanalysis studies on attacks of the substitution and transposit...
Cryptography is one of the common approaches to secure private data and cryptanalysis involves break...
Cryptography is one of the common approaches to secure private data and cryptanalysis involves break...
In this thesis, we investigate the applications of two swarm-inspired artificial life optimization t...
Abstract: In this paper three optimization heuristics are presented which can be utilized in attacks...
Abstract: Recent cryptosystems constitute an effective task for cryptanalysis algorithms due to thei...
With the increasing need to protect information digitally, the study of cryptography has become of p...
Possibility of application of ant colony algorithms for realization of the transposition ciphers cry...
Possibility of application of ant colony algorithms for realization of the transposition ciphers cry...
The Merkle-Hellman (MH) cryptosystem is one of the earliest public key cryptosystems, which is intro...
Abstract Genetic algorithms are a population-based Meta heuristics. They have been successfully app...
3rd International Conference on Computer Science and Engineering (UBMK) -- SEP 20-23, 2018 -- Saraje...
This paper formalizes a family of prioritized multicriteria optimization problems and assesses the c...
Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryp...