Enhancing the Bees Algorithm using the traplining metaphor
AH Ismail - 2021 - etheses.bham.ac.uk
This work aims to improve the performance of the Bees Algorithm (BA), particularly in terms
of simplicity, accuracy, and convergence. Three improvements were made in this study as a …
of simplicity, accuracy, and convergence. Three improvements were made in this study as a …
[PDF][PDF] An Efficient Cryptanalysis of Nonlinear Stream Cipher Based on Swarm Intelligent System.
Cryptography plays a crucial role in safeguarding privacy and confidentiality. Therefore, it is
imperative to ensure the security and resistance to cryptanalysis of the employed ciphers. In …
imperative to ensure the security and resistance to cryptanalysis of the employed ciphers. In …
[PDF][PDF] Enhancement of non-linear generators and calculate the randomness test for autocorrelation property
AA Alsaadi, AGN Al-Shammari - Iraqi Journal of Science, 2019 - iasj.net
In this paper, three main generators are discussed: Linear generator, Geffe generator and
Bruer generator. The Geffe and Bruer generators are improved and then calculate the …
Bruer generator. The Geffe and Bruer generators are improved and then calculate the …
An adaptive Particle Swarm Optimization to Solve Modern Security System
Nonlinear stream ciphers hold a vital position in ensuring confidentiality within contemporary
cryptographic systems. In this context, we interduce a new approach known as the Adaptive …
cryptographic systems. In this context, we interduce a new approach known as the Adaptive …
Cryptoanalysis of Simple Substitution Ciphers with Genetic Algorithms
D Savić, P Milić, B Mazinjanin - 2024 - nopr.niscpr.res.in
Recent advances in the field of machine learning have once again raised the question
whether computers can be trained to perform cryptanalytic tasks. In this paper, we identify …
whether computers can be trained to perform cryptanalytic tasks. In this paper, we identify …
[PDF][PDF] Data Security and Information Technology
FH Ali, WS Mahdi, AM Ali… - … and Computer Science …, 2024 - researchgate.net
In this paper, a general study is introduced about using the information technology in data
security. The most famous technologies of data protection, the cryptography and information …
security. The most famous technologies of data protection, the cryptography and information …
Improving the Cryptanalysis of Block Cipher Using Artificial Intelligence Algorithms
RL Malallah, AH Al Wattar - International Research Journal of …, 2023 - search.proquest.com
Nowadays, it is important to deliver information in a safe and confidential manner to specific
individuals or entities. As the best way for the defense is to attack, therefore, cryptanalysis …
individuals or entities. As the best way for the defense is to attack, therefore, cryptanalysis …