Iga: An improved genetic algorithm to construct weightwise (almost) perfectly balanced boolean functions with high weightwise nonlinearity

L Yan, J Cui, J Liu, G Xu, L Han, A Jolfaei… - Proceedings of the 2023 …, 2023 - dl.acm.org
The Boolean functions satisfying secure properties on the restricted sets of inputs are
studied recently due to their importance in the framework of the FLIP stream cipher …

A survey of metaheuristic algorithms for the design of cryptographic Boolean functions

M Djurasevic, D Jakobovic, L Mariot, S Picek - Cryptography and …, 2023 - Springer
Boolean functions are mathematical objects used in diverse domains and have been
actively researched for several decades already. One domain where Boolean functions play …

An improved hybrid genetic algorithm to construct balanced Boolean function with optimal cryptographic properties

PK Behera, S Gangopadhyay - Evolutionary Intelligence, 2022 - Springer
Boolean functions are used as nonlinear filter functions and combiner functions in several
stream ciphers. The security of these stream ciphers largely depends upon cryptographic …

Evolutionary construction of perfectly balanced boolean functions

L Mariot, S Picek, D Jakobovic… - 2022 IEEE Congress …, 2022 - ieeexplore.ieee.org
Finding Boolean functions suitable for cryptographic primitives is a complex combinatorial
optimization problem, since they must satisfy several properties to resist cryptanalytic …

Artificial intelligence for the design of symmetric cryptographic primitives

L Mariot, D Jakobovic, T Bäck… - Security and Artificial …, 2022 - Springer
This chapter provides a general overview of AI methods used to support the design of
cryptographic primitives and protocols. After giving a brief introduction to the basic concepts …

Evolutionary computation and machine learning in security

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
Stjepan Picek received his PhD in 2015 as a double doctorate under the supervision of Lejla
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …

Evolutionary computation and machine learning in cryptology

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2021 - dl.acm.org
6 Attacks on Ciphers-ML 7 Quantum Protocols-EC 8 Physically Unclonable Functions-EC,
ML 9 Hardware Trojans-EC, ML 10 Side-channel Analysis-ML, EC 11 Fault Injection-EC, ML …

Discovering Rotation Symmetric Self-dual Bent Functions with Evolutionary Algorithms

C Carlet, M Ðurasevic, D Jakobovic, S Picek - International Conference on …, 2024 - Springer
Bent Boolean functions are interesting mathematical objects with diverse real-world
applications. Besides looking at the whole class of bent functions, one could also consider …

Genetic Meta Cipher

A Hufschmitt, P Parraud - Proceedings of the Genetic and Evolutionary …, 2024 - dl.acm.org
We present a concrete application of genetic algorithm in the field of cryptography. More
precisely, we provide a new and original cryptographic symmetric encryption scheme called …

Look into the Mirror: Evolving Self-dual Bent Boolean Functions

C Carlet, M Durasevic, D Jakobovic, L Mariot… - … Conference on Genetic …, 2024 - Springer
Bent Boolean functions are important objects in cryptography and coding theory, and there
are several general approaches for constructing such functions. Metaheuristics proved to be …