Iga: An improved genetic algorithm to construct weightwise (almost) perfectly balanced boolean functions with high weightwise nonlinearity
The Boolean functions satisfying secure properties on the restricted sets of inputs are
studied recently due to their importance in the framework of the FLIP stream cipher …
studied recently due to their importance in the framework of the FLIP stream cipher …
A survey of metaheuristic algorithms for the design of cryptographic Boolean functions
Boolean functions are mathematical objects used in diverse domains and have been
actively researched for several decades already. One domain where Boolean functions play …
actively researched for several decades already. One domain where Boolean functions play …
An improved hybrid genetic algorithm to construct balanced Boolean function with optimal cryptographic properties
PK Behera, S Gangopadhyay - Evolutionary Intelligence, 2022 - Springer
Boolean functions are used as nonlinear filter functions and combiner functions in several
stream ciphers. The security of these stream ciphers largely depends upon cryptographic …
stream ciphers. The security of these stream ciphers largely depends upon cryptographic …
Evolutionary construction of perfectly balanced boolean functions
Finding Boolean functions suitable for cryptographic primitives is a complex combinatorial
optimization problem, since they must satisfy several properties to resist cryptanalytic …
optimization problem, since they must satisfy several properties to resist cryptanalytic …
Artificial intelligence for the design of symmetric cryptographic primitives
This chapter provides a general overview of AI methods used to support the design of
cryptographic primitives and protocols. After giving a brief introduction to the basic concepts …
cryptographic primitives and protocols. After giving a brief introduction to the basic concepts …
Evolutionary computation and machine learning in security
S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
Stjepan Picek received his PhD in 2015 as a double doctorate under the supervision of Lejla
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …
Evolutionary computation and machine learning in cryptology
S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2021 - dl.acm.org
6 Attacks on Ciphers-ML 7 Quantum Protocols-EC 8 Physically Unclonable Functions-EC,
ML 9 Hardware Trojans-EC, ML 10 Side-channel Analysis-ML, EC 11 Fault Injection-EC, ML …
ML 9 Hardware Trojans-EC, ML 10 Side-channel Analysis-ML, EC 11 Fault Injection-EC, ML …
Discovering Rotation Symmetric Self-dual Bent Functions with Evolutionary Algorithms
Bent Boolean functions are interesting mathematical objects with diverse real-world
applications. Besides looking at the whole class of bent functions, one could also consider …
applications. Besides looking at the whole class of bent functions, one could also consider …
Genetic Meta Cipher
A Hufschmitt, P Parraud - Proceedings of the Genetic and Evolutionary …, 2024 - dl.acm.org
We present a concrete application of genetic algorithm in the field of cryptography. More
precisely, we provide a new and original cryptographic symmetric encryption scheme called …
precisely, we provide a new and original cryptographic symmetric encryption scheme called …
Look into the Mirror: Evolving Self-dual Bent Boolean Functions
Bent Boolean functions are important objects in cryptography and coding theory, and there
are several general approaches for constructing such functions. Metaheuristics proved to be …
are several general approaches for constructing such functions. Metaheuristics proved to be …