{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:17:36Z","timestamp":1742973456028,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319452456"},{"type":"electronic","value":"9783319452463"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45246-3_10","type":"book-chapter","created":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T16:55:13Z","timestamp":1480438513000},"page":"102-112","source":"Crossref","is-referenced-by-count":4,"title":["Differential Cryptanalysis of FEAL4 Using Evolutionary Algorithm"],"prefix":"10.1007","author":[{"given":"Kamil","family":"Dworak","sequence":"first","affiliation":[]},{"given":"Urszula","family":"Boryczka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"10_CR1","unstructured":"Kenan, K.: Cryptography in the Databases. The Last Line of Defense. Addison Wesley Publishing Company, New York (2005)"},{"key":"10_CR2","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2011","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Pearson, New York (2011)","edition":"5"},{"key":"10_CR3","volume-title":"Cryptography: Theory and Practice","author":"DR Stinson","year":"1995","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice. CRC Press Inc., Boca Raton (1995)"},{"key":"10_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-07324-7","volume-title":"Fundamentals of Computer Security","author":"J Pieprzyk","year":"2003","unstructured":"Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. CRC Press Inc., Boca Raton (2003)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-319-05458-2_16","volume-title":"Intelligent Information and Database Systems","author":"U Boryczka","year":"2014","unstructured":"Boryczka, U., Dworak, K.: Genetic transformation techniques in cryptanalysis. In: Nguyen, N.T., Attachoo, B., Trawi\u0144ski, B., Somboonviwat, K. (eds.) ACIIDS 2014, Part II. LNCS, vol. 8398, pp. 147\u2013156. Springer, Heidelberg (2014)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Song, J., Zhang, H., Meng, Q., Wang, Z.: Cryptanalysis of four-round DES based on genetic algorithm. In: Proceedings of IEEE International Conference on Wireless Communications, Network and Mobile Computing, pp. 2326\u20132329. IEEE (2007)","DOI":"10.1109\/WICOM.2007.580"},{"issue":"2","key":"10_CR7","first-page":"52","volume":"3","author":"H Bhasin","year":"2015","unstructured":"Bhasin, H., Hameed, K.A.: Cryptanalysis using soft computing techniques. J. Comput. Sci. Appl. 3(2), 52\u201355 (2015)","journal-title":"J. Comput. Sci. Appl."},{"key":"10_CR8","doi-asserted-by":"crossref","first-page":"32","DOI":"10.11648\/j.ajnc.20150403.12","volume":"4","author":"P Garg","year":"2015","unstructured":"Garg, P., Varshney, S., Bhardwaj, M.: Cryptanalysis of simplified data encryption standard using genetic algorithm. Am. J. Net. Comm. 4, 32\u201336 (2015)","journal-title":"Am. J. Net. Comm."},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-319-24306-1_16","volume-title":"Computational Collective Intelligence","author":"K Dworak","year":"2015","unstructured":"Dworak, K., Boryczka, U.: Cryptanalysis of SDES using modified version of binary particle swarm optimization. In: N\u00fa\u00f1ez, M., Nguyen, N.T., Camacho, D., Trawinski, B. (eds.) ICCCI 2015. LNCS, vol. 9330, pp. 159\u2013168. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-24306-1_16"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Abd-Elmonim, W.G., Ghali, N.I., Hassanien, A.E., Abraham, A.: Known-plaintext attack of DES-16 using particle swarm optimization. In: Proceedings of Third World Congress on Nature and Biologically Inspired Computing (NaBIC), pp. 12\u201316. IEEE (2011)","DOI":"10.1109\/NaBIC.2011.6089410"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/3-540-45105-6_16","volume-title":"Genetic and Evolutionary Computation - GECCO 2003","author":"M Russell","year":"2003","unstructured":"Russell, M., Clark, J.A., Stepney, S.: Using ants to attack a classical cipher. In: Cant\u00fa-Paz, E., et al. (eds.) GECCO 2003. LNCS, vol. 2723, pp. 146\u2013147. Springer, Heidelberg (2003)"},{"key":"10_CR12","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1504\/IJMHEUR.2014.065159","volume":"3","author":"T Mekhaznia","year":"2014","unstructured":"Mekhaznia, T., Menai, M.E.B.: Cryptanalysis of classical ciphers with ant algorithms. Int. J. Metaheuristics 3, 175\u2013198 (2014)","journal-title":"Int. J. Metaheuristics"},{"issue":"1","key":"10_CR13","first-page":"34","volume":"1","author":"P Garg","year":"2009","unstructured":"Garg, P.: Genetic algorithms, tabu search and simulated annealing: a comparasion between three approached for the cryptanalysis of transposition cipher. IJNSA 1(1), 34\u201352 (2009)","journal-title":"IJNSA"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Dewu, X., Wei, C.: A survey on cryptanalysis of block ciphers. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), vol. 8, pp. 218\u2013220 (2010)","DOI":"10.1109\/ICCASM.2010.5619368"},{"key":"10_CR15","doi-asserted-by":"crossref","first-page":"e823","DOI":"10.1016\/j.na.2005.03.004","volume":"63","author":"EC Laskari","year":"2005","unstructured":"Laskari, E.C., Meletiou, G.C., Stamatiou, Y.C., Vrahatis, M.N.: Evolutionary computation based cryptanalysis: a first study. Nonlinear Anal. 63, e823\u2013e830 (2005)","journal-title":"Nonlinear Anal."},{"key":"10_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03315-9","volume-title":"Genetic Algorithms + Data Structures = Evolution Programs","author":"Z Michalewicz","year":"1996","unstructured":"Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs, 3rd edn. Springer, London (1996)","edition":"3"},{"key":"10_CR17","series-title":"Optimization and Machine Learning","volume-title":"Genetic Algorithms in Search","author":"DE Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search. Optimization and Machine Learning. Addison-Wesley Longman Publishing, Boston (1989)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/3-540-39118-5_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201987","author":"A Shimizu","year":"1988","unstructured":"Shimizu, A., Miyaguchi, S.: Fast data encipherment algorithm FEAL. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 267\u2013278. Springer, Heidelberg (1988)"},{"key":"10_CR19","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, New York (1996)"},{"key":"10_CR20","series-title":"Breaking Ciphers in the Real World","doi-asserted-by":"crossref","DOI":"10.1002\/9780470148778","volume-title":"Applied Cryptanalysis","author":"M Stamp","year":"2007","unstructured":"Stamp, M., Low, R.M.: Applied Cryptanalysis. Breaking Ciphers in the Real World. Wiley, New York (2007)"},{"issue":"1","key":"10_CR21","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4(1), 3\u201372 (1991)","journal-title":"J. Cryptology"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45246-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:47:42Z","timestamp":1498351662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45246-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319452456","9783319452463"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45246-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}