Computer Security 및 Cryptography 위한 진화론적 계산의 적용 소개 |
Jeon, Jun-Cheol
(경북대학교 공과대학 대학원 컴퓨터공학과)
Kim, Gi-Won (경북대학교 공과대학 대학원 컴퓨터공학과) Im, Jae-Yeol (경북대학교 공과대학 대학원 컴퓨터공학과) Yun, Hui-Jeong (경북대학교 공과대학 대학원 컴퓨터공학과) Yu, Gi-Yeong (경북대학교 공과대학 컴퓨터공학과) |
1 | J. C. King, 'An algorithm for the complete cryptanalysis of periodic polyalphabetic substitution ciphers, Cryptologia, Vol. 18, No. 4, pp. 332-355, 1994 |
2 | W. S. Forsyth, and R. Safavi-Naini, 'Automated cryptanalysis of substitution ciphers,' Cryptologia, Vol. 17, No. 4, pp. 407-418, 1993 |
3 | I. A. Clark et al. 'Almost Boolean Functions: the Design of Boolean Functions by Spectral Inversion,' IEEE Proceedings, 2003 |
4 | J. C. Jeon and K. Y. Yoo, 'Design of Montgomery Multiplication Architecture Based on Programmable Cellular Automata,' Computational Intelligence, Vol, 20. No. 3, pp. 495-502, 2004 |
5 | R. Alonso-Sanz, and M. Martin, 'One-dimensional cellular automata with memory: patterns from a single site seed,' International Journal of Bifurcation and Chaos Applied Sciences and Engineering, pp. 205-226, 2002 |
6 | S. Wolfram, 'Random sequence generation by cellular automata,' Advances in Applied Mathematics, Vol. 7, No. 2, pp. 123-169, 1986 |
7 | Sheng-Uei Guan and Shu Zhang, 'An Evolutionary Approach to the Design of Controllable Cellular Automata Structure for Random Number Generation,' IEEE Transactions on evolutionary computation, Vol. 7, No. 1, pp. 23-36, 2003 |
8 | A. Clark and E. Dawson, 'A parallel genetic algorithm for cryptanalysis of the polyalphabetic substitution cipher,' Cryptologia, Vol. 21, No. 2, pp. 129-138, 1997 |
9 | D. G. B. Hunter and A. R. Mckenzie, 'Experiments with relaxation algorithms for breaking simple substitution ciphers,' The Computer Journal, Vol. 26, No. 1, pp. 68-71, 1983 |
10 | A. J. Bagnall, G. P. McKeown, and V. J. Rayward-Smith, 'The cryptanalysis of a three rotor machine using a genetic algorithm,' Proceedings of the 7th International Conference on Genetics Algorithms ICGA '97, Morgan-Kaufmann, pp. 712-718, 1997 |
11 | Sheng-Uei, and S. Zhang, 'An evolutionary approach to the design of controllable cellular automata structure for random number generation,' IEEE Transactions on Evolutionary Computation. Vol. 7, No. 1, pp. 23-36, 2003 |
12 | S. Peleg and A. Rosenfeld, 'Breaking substitution ciphers using a relaxation algorithm,' Communications of the ACM, Vol. 22, No. 11, pp. 598-605, 1979 |
13 | R. Spillma, M. Janssen, B. Nelson and M. Kepner, 'Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers,' Cryptologia, Vol. 17, No. 1, pp. 31-44, 1993 |
14 | W. Millan et al., 'New Concepts in Evolutionary Search for Boolean Functions in Cryptology,' IEEE Proceedings, 2003 |
15 | Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997 |
16 | M. Mihaljevic, Y. Zheng. and H. ImaiA Cellular Automata based Fast One-Way Hash Function Suitable for Hardware Implementation.' Public Key Cryptography- Proceedings of PKC'98, LNCS. Vol. 1431, pp. 217-233, 1998 |
17 | P. Isasi and J. C. Hernandez, 'Introduction to the applications of evolutionary computation in computer security and crytography,' Computational Intelligence, Vol. 20, No. 3, pp. 445-449, 2004 |
18 | G. Alvarez Maranon, L. Hernandez Encinas, and A. Martin del Rey, 'Sharing secret color images using cellular automata with memory, arXiv. org e-Piint, CR/0312034, 2003 |
19 | J. Von Neumann, The theory of self reproducing cellular automata, University of Illinois Press, Urbana, Illinois, 1967 |
20 | P. Pal. Choudhury and R. Barua, 'Cellular Automata Based VLSI Architecture for Computing Multiplication And Inverses In GF(),' IEEE 7th International Conference on VLSI Design. pp. 279-282. 1994 |
21 | F. Seredynski, P. Bouvry, and A. Y. Zomaya, 'Cellular Programming and Symetric Key Cryptography Systems, Genetic and Evolutionary Computation (GECCO), LNCS 2724, Part II, pp. 1369-1381, 2003 |
22 | J. C. King and D. R. Bahler, 'An implementation of probabilistic relaxation in the cryptanalysis of simple substitution ciphers,' Cryptologia, Vol. 16, No. 3, pp. 215-225, 1992 |
23 | S. Wolfram, A New Kind of Science Wolfram Media, pp. 435-441, 2002 |
24 | J. M. Carroll and S. Martin, 'The automated cryptanalysis of substitution ciphers,' Cryptologia, Vol. 10, No. 4, pp. 193-209, 1986 |
25 | M. Sipper and M. Tomassini, 'Generating parallel random number generators by cellular programming, Int. J. Mod. Phys, Vol. 7, No. 2, pp. 181-190, 1996 |