{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:44:27Z","timestamp":1725857067222},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319393773"},{"type":"electronic","value":"9783319393780"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39378-0_33","type":"book-chapter","created":{"date-parts":[[2016,5,28]],"date-time":"2016-05-28T03:40:51Z","timestamp":1464406851000},"page":"380-391","source":"Crossref","is-referenced-by-count":4,"title":["Application of Genetic Algorithms in the Construction of Invertible Substitution Boxes"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Kapu\u015bci\u0144ski","sequence":"first","affiliation":[]},{"given":"Robert K.","family":"Nowicki","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Napoli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,29]]},"reference":[{"issue":"4","key":"33_CR1","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1515\/jaiscr-2015-0031","volume":"5","author":"MH Aghdam","year":"2015","unstructured":"Aghdam, M.H., Heidari, S.: Feature selection using particle swarm optimization in text categorization. J. Artif. Intell. Soft Comput. Res. 5(4), 231\u2013238 (2015)","journal-title":"J. Artif. Intell. Soft Comput. Res."},{"doi-asserted-by":"crossref","unstructured":"Aguirre, H., Okazaki, H., Fuwa, Y.: An evolutionary multiobjective approach to design highly non-linear boolean functions. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, GECCO 2007, pp. 749\u2013756. ACM, New York (2007)","key":"33_CR2","DOI":"10.1145\/1276958.1277112"},{"unstructured":"Burnett, L.D.: Heuristic Optimization of Boolean Functions and Substitution Boxes for Cryptography. Ph.D. thesis, Queensland University of Technology (2005)","key":"33_CR3"},{"issue":"1","key":"33_CR4","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.ffa.2005.07.003","volume":"13","author":"C Carlet","year":"2007","unstructured":"Carlet, C., Ding, C.: Nonlinearities of s-boxes. Finite Fields Appl. 13(1), 121\u2013135 (2007)","journal-title":"Finite Fields Appl."},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1007\/3-540-45105-6_95","volume-title":"Genetic and Evolutionary Computation - GECCO 2003","author":"D Chafekar","year":"2003","unstructured":"Chafekar, D., Xuan, J., Rasheed, K.: Constrained multi-objective optimization using steady state genetic algorithms. In: Cant\u00fa-Paz, E., et al. (eds.) GECCO 2003. LNCS, vol. 2723, pp. 813\u2013824. Springer, Heidelberg (2003)"},{"issue":"3","key":"33_CR6","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1515\/jaiscr-2015-0029","volume":"5","author":"Q Chen","year":"2015","unstructured":"Chen, Q., Abercrombie, R.K., Sheldon, F.T.: Risk assessment for industrial control systems quantifying availability using mean failure cost (mfc). J. Artif. Intell. Soft Comput. Res. 5(3), 205\u2013220 (2015)","journal-title":"J. Artif. Intell. Soft Comput. Res."},{"unstructured":"Daemen, J., Rijmen, V.: Aes proposal: Rijndael (1999)","key":"33_CR7"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1007\/3-540-46416-6_30","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"MH Dawson","year":"1991","unstructured":"Dawson, M.H., Tavares, S.: An expanded set of s-box design criteria based on information theory and its relation to differential-like attacks. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 352\u2013367. Springer, Heidelberg (1991)"},{"issue":"2","key":"33_CR9","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: Nsga-ii. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"10","key":"33_CR10","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1016\/j.advengsoft.2011.05.014","volume":"42","author":"JJ Durillo","year":"2011","unstructured":"Durillo, J.J., Nebro, A.J.: jmetal: A java framework for multi-objective optimization. Adv. Eng. Softw. 42(10), 760\u2013771 (2011)","journal-title":"Adv. Eng. Softw."},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-642-01020-0_18","volume-title":"Evolutionary Multi-Criterion Optimization","author":"JJ Durillo","year":"2009","unstructured":"Durillo, J.J., Nebro, A.J., Luna, F., Alba, E.: On the effect of the steady-state selection scheme in multi-objective genetic algorithms. In: Ehrgott, M., Fonseca, C.M., Gandibleux, X., Hao, J.-K., Sevaux, M. (eds.) EMO 2009. LNCS, vol. 5467, pp. 183\u2013197. Springer, Heidelberg (2009)"},{"issue":"1","key":"33_CR12","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1515\/jaiscr-2016-0004","volume":"6","author":"Y Hayashi","year":"2016","unstructured":"Hayashi, Y., Tanaka, Y., Takagi, T., Saito, T., Iiduka, H., Kikuchi, H., Bologna, G., Mitra, S.: Recursive-rule extraction algorithm with J48graft and applications to generating credit scores. J. Artif. Intell. Soft Comput. Res. 6(1), 35\u201344 (2016)","journal-title":"J. Artif. Intell. Soft Comput. Res."},{"doi-asserted-by":"crossref","unstructured":"Ivanov, G., Nikolov, N., Nikova, S.: Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties. Crypt. Commun., 1\u201330 (2016)","key":"33_CR13","DOI":"10.1007\/s12095-015-0170-5"},{"key":"33_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/978-3-540-69731-2_40","volume-title":"Artificial Intelligence and Soft Computing \u2013 ICAISC 2008","author":"M Korytkowski","year":"2008","unstructured":"Korytkowski, M., Gabryel, M., Rutkowski, L., Drozda, S.: Evolutionary methods to create interpretable modular system. In: Rutkowski, L., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2008. LNCS (LNAI), vol. 5097, pp. 405\u2013413. Springer, Heidelberg (2008)"},{"key":"33_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/978-3-540-30543-9_53","volume-title":"Advances in Multimedia Information Processing - PCM 2004","author":"C Li","year":"2004","unstructured":"Li, C., Li, S., Zhang, D., Chen, G.: Cryptanalysis of a chaotic neural network based multimedia encryption scheme. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3333, pp. 418\u2013425. Springer, Heidelberg (2004)"},{"issue":"4\u20136","key":"33_CR16","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1016\/j.neucom.2008.11.005","volume":"72","author":"S Lian","year":"2009","unstructured":"Lian, S.: A block cipher based on chaotic neural networks. Neurocomputing 72(4\u20136), 1296\u20131301 (2009). Brain Inspired Cognitive Systems (BICS 2006)\/Interplay Between Natural and Artificial Computation (IWINAC 2007)","journal-title":"Neurocomputing"},{"unstructured":"Parker, M.: Generalised s-box nonlinearity. NESSIE Public Document NES\/DOC\/UIB\/WP5\/020\/A (2003)","key":"33_CR17"},{"issue":"1","key":"33_CR18","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1515\/jaiscr-2016-0003","volume":"6","author":"AM Serdah","year":"2016","unstructured":"Serdah, A.M., Ashour, W.M.: Clustering large-scale data based on modified affinity propagation algorithm. J. Artif. Intell. Soft Comput. Res. 6(1), 23\u201333 (2016)","journal-title":"J. Artif. Intell. Soft Comput. Res."},{"issue":"4","key":"33_CR19","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems*. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"issue":"3","key":"33_CR20","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1162\/evco.1994.2.3.221","volume":"2","author":"N Srinivas","year":"1994","unstructured":"Srinivas, N., Deb, K.: Muiltiobjective optimization using nondominated sorting in genetic algorithms. Evol. Comput. 2(3), 221\u2013248 (1994)","journal-title":"Evol. Comput."},{"key":"33_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/978-3-642-29350-4_40","volume-title":"Artificial Intelligence and Soft Computing","author":"A Szarek","year":"2012","unstructured":"Szarek, A., Korytkowski, M., Rutkowski, L., Scherer, R., Szyprowski, J.: Application of neural networks in assessing changes around implant after total hip arthroplasty. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2012, Part II. LNCS, vol. 7268, pp. 335\u2013340. Springer, Heidelberg (2012)"},{"issue":"4\u20135","key":"33_CR22","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.physleta.2006.03.069","volume":"356","author":"W Yu","year":"2006","unstructured":"Yu, W., Cao, J.: Cryptography based on delayed chaotic neural networks. Phys. Lett. A 356(4\u20135), 333\u2013338 (2006)","journal-title":"Phys. Lett. A"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39378-0_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T20:43:27Z","timestamp":1567975407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39378-0_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319393773","9783319393780"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39378-0_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}