{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:11:20Z","timestamp":1725804680032},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112886"},{"type":"electronic","value":"9783319112893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11289-3_63","type":"book-chapter","created":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T21:07:33Z","timestamp":1409864853000},"page":"623-632","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis of Transposition Cipher Using Evolutionary Algorithms"],"prefix":"10.1007","author":[{"given":"Urszula","family":"Boryczka","sequence":"first","affiliation":[]},{"given":"Kamil","family":"Dworak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-05458-2_16","volume-title":"Intelligent Information and Database Systems","author":"U. Boryczka","year":"2014","unstructured":"Boryczka, U., Dworak, K.: Genetic transformation techniques in cryptanalysis. In: Nguyen, N.T., Attachoo, B., Trawi\u0144ski, B., Somboonviwat, K. (eds.) ACIIDS 2014, Part II. LNCS, vol.\u00a08398, pp. 147\u2013156. Springer, Heidelberg (2014)"},{"key":"63_CR2","doi-asserted-by":"crossref","unstructured":"Bauer, F.L.: Decrypted Secrets. Methods and Maxims of Cryptology. Springer, Heidelberg (2002)","DOI":"10.1007\/978-3-662-04736-1"},{"key":"63_CR3","unstructured":"Bryant, K.: Genetic Algorithms and the Traveling Salesman Problem. Departamenr of Mathematics, Harvey Mudd College (December 2000)"},{"key":"63_CR4","unstructured":"Clark, A.J.: Optimisation Heuristics for Cryptology. PhD thesis, Information Research Centre Faculty of Information Technology Queensland (1998)"},{"key":"63_CR5","unstructured":"Davis, L.: Applying Adaptive Algorithms to Epistatic Domains. In: Proceedings of the International Joint Conference on Artifical Intelligence (1985)"},{"key":"63_CR6","unstructured":"Deep, K., Mebrahtu, H.: New Variations of Order Crossover for Travelling Salesmap Problem. International Journal of Combinatorial Optimization Problems and Informatics\u00a02(1) (2011)"},{"key":"63_CR7","unstructured":"Delman, B.: Genetic Algorithms in Cryptography. Rochester Institute of Technology. Rochester, New York (2004)"},{"key":"63_CR8","unstructured":"Ghonaim, W.A.: Evolutionary Computation in Cryptanalysis. Departament of Mathematics Faculty of Science (Girls). Al-Azhar University (2013)"},{"key":"63_CR9","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search Optimization, and Machine Learning. Addison-Wesley, Boston (1989)"},{"key":"63_CR10","unstructured":"Goldberg, D.E., Lingle, R.: Alleles, Loci, and the TSP. In: Proceedings of the First International Conference on Genetic Algorithms (1985)"},{"key":"63_CR11","unstructured":"Kahn, D.: The Code-breakers. Scribner, New York (1996)"},{"key":"63_CR12","unstructured":"Kenan, K.: Cryptography in the databases. The Last Line of Defense. Addison Wesley Publishing Company (2005)"},{"key":"63_CR13","doi-asserted-by":"crossref","unstructured":"Laskari, E.C., Meletiou, G.C., Stamatiou, Y.C., Vrahatis, M.N.: Evolutionary computation based cryptanalysis: A first study. Nonlinear Analysis 63 (2005)","DOI":"10.1016\/j.na.2005.03.004"},{"key":"63_CR14","doi-asserted-by":"crossref","unstructured":"Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs. Springer, London (1996)","DOI":"10.1007\/978-3-662-03315-9"},{"key":"63_CR15","volume-title":"Proceedings of the Second International Conference on Genetic Algorithms on Genetic Algorithms and Their Application","author":"I.M. Oliver","year":"1987","unstructured":"Oliver, I.M., Smith, D.J., Holland, J.R.C.: A Study of Permutation Crossover Operators on the Traveling Salesman Problem. In: Proceedings of the Second International Conference on Genetic Algorithms on Genetic Algorithms and Their Application. Erlbaum Associates Inc., Hillsdale (1987)"},{"key":"63_CR16","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code In C, 2nd edn. Wiley (1996)"},{"key":"63_CR17","unstructured":"Stinson, D.S.: Cryptography. Theory And Practice. Chapman & Hall\/CRC Taylor & Francis Group, Boca Raton (2006)"},{"key":"63_CR18","unstructured":"Toemeh, R., Arumugam, S.: Breaking Transposition Cipher with Genetic Algorithm. Electronics and Electrical Engineering 7(79) (2007)"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence. Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11289-3_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T16:19:34Z","timestamp":1558973974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11289-3_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319112886","9783319112893"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11289-3_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}