Journal of Software Engineering and Applications

Journal of Software Engineering and Applications

ISSN Print: 1945-3116
ISSN Online: 1945-3124
www.scirp.org/journal/jsea
E-mail: jsea@scirp.org
"Cryptanalysis of TEA Using Quantum-Inspired Genetic Algorithms"
written by Wei Hu,
published by Journal of Software Engineering and Applications, Vol.3 No.1, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Crypto makes ai evolve
Crypto and AI: From …, 2023
[2] Cybersecurity challenges in the healthcare domain and theroad ahead
AIP Conference …, 2023
[3] Crypto and AI: From Coevolution to Quantum Revolution
2023
[4] Enhancing medical data security using tiny encryption algorithm and least significant bit steganography
AIP Conference …, 2023
[5] ОГЛЯД ЗАСТОСУВАННЯ МЕТАЕВРИСТИЧНОГО ПІДХОДУ В КРИПТОАНАЛІЗІ
Вестник Херсонского национального …, 2023
[6] ОСОБЛИВОСТІ ЗАСТОСУВАННЯ АЛГОРИТМУ АСО ДО ДЕЯКИХ ЗАДАЧ КРИПТОАНАЛІЗУ
Science-based technologies, 2023
[7] ОСОБЛИВОСТІ ЗАСТОСУВАННЯ АЛГОРИТМУ АСО ДО ДЕЯКИХ ЗАДАЧ КРИПТОАНАЛІЗУ.
Science-Based Technologies, 2023
[8] Hybrid Quantum Metaheuristics: Theory and Applications
2022
[9] Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis
Entropy, 2021
[10] ขั้น ตอน วิธี เชิง พันธุกรรม แบบ กระชับ ชนิด ค วอน ตั ม สำหรับ ปัญหา ยาก
2021
[11] 从演化密码到量子人工智能密码综述
2019
[12] Breaching Security of Full Round Tiny Encryption Algorithm
International Journal of Information Security and Privacy (IJISP), 2018
[13] IMPACT OF GENETIC ALGORITHM IN CRYPTOLOGY–AN EMPIRICAL STUDY
International Journal of Computer Engineering and Applications, 2018
[14] Metaheuristic algorithms in stream ciphers cryptanalysis
2018
[15] Optimisation heuristics in randomness testing
2017
[16] Quantum Genetic Algorithms for Computer Scientists
Computers, 2016
[17] Randomness analysis in authenticated encryption systems
2016
[18] New results on reduced-round Tiny Encryption Algorithm using genetic programming
2016
[19] TEA analysis using genetic programming
2015
[20] Applications of Genetic Algorithms in Cryptology
Proceedings of the Third International Conference on Soft Computing for Problem Solving. Springer India, 2014
[21] Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits
E-Business and Telecommunications, 2014
[22] YouTube user and usage profiling: Stories of political horror and security success
E-Business and …, 2014
[23] On the origin of yet another channel
Security Protocols XXI, 2013
[24] Towards cryptographic function distinguishers with evolutionary circuits
10th International Conference on Security and Cryptography, Laboratory of Security and Applied Cryptography, Masaryk University, 2013
[25] The Evolution of Randomess Testing
2013
[26] An evolutionary computation attack on one-round TEA
Procedia Computer Science, 2011
[27] Crypto and AI
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top