4.6 Article

Metaheuristics in the Optimization of Cryptographic Boolean Functions

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Memetic Algorithm with Hungarian Matching Based Crossover and Diversity Preservation

Emmanuel Romero Ruiz et al.

COMPUTACION Y SISTEMAS (2018)

Article Computer Science, Artificial Intelligence

Improving Diversity in Evolutionary Algorithms: New Best Solutions for Frequency Assignment

Carlos Segura et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2017)

Article Computer Science, Hardware & Architecture

Exploring Shared SRAM Tables in FPGAs for Larger LUTs and Higher Degree of Sharing

Ali Asghar et al.

INTERNATIONAL JOURNAL OF RECONFIGURABLE COMPUTING (2017)

Article Computer Science, Artificial Intelligence

Cryptographic Boolean functions: One output, many design criteria

Stjepan Picek et al.

APPLIED SOFT COMPUTING (2016)

Article Computer Science, Artificial Intelligence

Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography

Stjepan Picek et al.

EVOLUTIONARY COMPUTATION (2016)

Article Automation & Control Systems

A Novel Diversity-Based Replacement Strategy for Evolutionary Algorithms

Carlos Segura et al.

IEEE TRANSACTIONS ON CYBERNETICS (2016)

Article Physics, Multidisciplinary

A Clustering Method Based on the Maximum Entropy Principle

Edwin Aldana-Bobadilla et al.

ENTROPY (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Evolutionary Methods for the Construction of Cryptographic Boolean Functions

Stjepan Picek et al.

GENETIC PROGRAMMING (EUROGP 2015) (2015)

Article Computer Science, Theory & Methods

Exploration and Exploitation in Evolutionary Algorithms: A Survey

Matej Crepinsek et al.

ACM COMPUTING SURVEYS (2013)

Article Computer Science, Theory & Methods

Construction of balanced Boolean functions with high nonlinearity and good autocorrelation properties

Deng Tang et al.

DESIGNS CODES AND CRYPTOGRAPHY (2013)

Article Engineering, Multidisciplinary

An evolutionary approach to construct cryptographically strong Boolean functions

Rajni Goyal et al.

INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT (2012)

Article Computer Science, Artificial Intelligence

A Multi-Facet Survey on Memetic Computation

Xianshun Chen et al.

IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2011)