{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:17:37Z","timestamp":1772111857868,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319670768","type":"print"},{"value":"9783319670775","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67077-5_11","type":"book-chapter","created":{"date-parts":[[2017,9,6]],"date-time":"2017-09-06T01:42:47Z","timestamp":1504662167000},"page":"107-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Genetic Algorithm as Optimization Tool for Differential Cryptanalysis of DES6"],"prefix":"10.1007","author":[{"given":"Kamil","family":"Dworak","sequence":"first","affiliation":[]},{"given":"Urszula","family":"Boryczka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,7]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07324-7","volume-title":"Fundamentals of Computer Security","author":"J Pieprzyk","year":"2003","unstructured":"Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. CRC Press, Inc., Boca Raton (2003)"},{"key":"11_CR2","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2011","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Pearson, New York (2011)","edition":"5"},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"11_CR4","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Hoboken (1996)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-319-45246-3_10","volume-title":"Computational Collective Intelligence","author":"K Dworak","year":"2016","unstructured":"Dworak, K., Boryczka, U.: Differential cryptanalysis of FEAL4 using evolutionary algorithm. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawi\u0144ski, B. (eds.) ICCCI 2016. LNCS, vol. 9876, pp. 102\u2013112. Springer, Cham (2016). doi:10.1007\/978-3-319-45246-3_10"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Song, J., Zhang, H., Meng, Q., Wang, Z.: Cryptanalysis of four-round DES based on genetic algorithm. In: Proceedings of IEEE International Conference on Wireless Communication, Network and Mobile Computing, pp. 2326\u20132329. IEEE (2007)","DOI":"10.1109\/WICOM.2007.580"},{"key":"11_CR7","first-page":"213","volume":"5","author":"HMH Huseim","year":"2007","unstructured":"Huseim, H.M.H., Bayoumi, B.I., Holail, F.S., Hasan, B.E.M., El-Mageed, M.Z.A.: A genetic algorithm for cryptanalysis of DES-8. Int. J. Netw. Secur. 5, 213\u2013219 (2007)","journal-title":"Int. J. Netw. Secur."},{"key":"11_CR8","first-page":"5","volume":"10","author":"T Tadros","year":"2010","unstructured":"Tadros, T., Hegazy, A.E.F., Badr, A.: Genetic algorithm for DES cryptanalysis genetic algorithm for DES cryptanalysis. Int. J. Comput. Sci. Netw. Secur. 10, 5\u201311 (2010)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"11_CR9","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-31277-4_1","volume-title":"Recent Developments in Intelligent Information and Database Systems","author":"K Dworak","year":"2016","unstructured":"Dworak, K., Nalepa, J., Boryczka, U., Kawulok, M.: Cryptanalysis of SDES using genetic and memetic algorithms. In: Kr\u00f3l, D., Madeyski, L., Nguyen, N.T. (eds.) Recent Developments in Intelligent Information and Database Systems. SCI, vol. 642, pp. 3\u201314. Springer, Cham (2016). doi:10.1007\/978-3-319-31277-4_1"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"32","DOI":"10.11648\/j.ajnc.20150403.12","volume":"4","author":"P Garg","year":"2015","unstructured":"Garg, P., Varshney, S., Bhardwaj, M.: Cryptanalysis of simplified data encryption standard using genetic algorithm. Am. J. Netw. Commun. 4, 32\u201336 (2015)","journal-title":"Am. J. Netw. Commun."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Abd-Elmonim, W.G., Ghali, N.I., Hassanien, A.E., Abraham, A.: Known-plaintext attack of DES-16 using particle swarm optimization. In: Third World Congress on Nature and Biologically Inspired Computing, vol. 9330, pp. 12\u201316. IEEE (2011)","DOI":"10.1109\/NaBIC.2011.6089410"},{"key":"11_CR12","series-title":"Advances in Intelligent and Soft Computing","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1007\/978-81-322-0487-9_97","volume-title":"Proceedings of the International Conference on SocProS 2011","author":"SS Jadon","year":"2012","unstructured":"Jadon, S.S., Sharma, H., Kumar, E., Bansal, J.C.: Application of binary particle swarm optimization in cryptanalysis of DES. In: Deep, K., Nagar, A., Pant, M., Bansal, J.C. (eds.) Proceedings of the International Conference on SocProS 2011. AINSC, vol. 130, pp. 1061\u20131071. Springer, India (2012). doi:10.1007\/978-81-322-0487-9_97"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Nalini, N., Raghavendra, R.G.: Cryptanalysis of block ciphers via improved simulated annealing technique. In: Information Technology, ICIT, vol. 130, pp. 182\u2013185. IEEE (2007)","DOI":"10.1109\/ICIT.2006.40"},{"key":"11_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03315-9","volume-title":"Genetic Algorithms + Data Structures = Evolution Programs","author":"Z Michalewicz","year":"1996","unstructured":"Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs, 3rd edn. Springer, London (1996). doi:10.1007\/978-3-662-03315-9","edition":"3"},{"key":"11_CR15","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley Longman Publishing, Boston (1989)"},{"key":"11_CR16","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"11_CR17","volume-title":"Cryptography: Theory and Practice","author":"DR Stinson","year":"1995","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Inc., Boca Raton (1995)"},{"key":"11_CR18","unstructured":"O\u2019Connor, L.J.: An analysis of product ciphers based on the properties of Boolean functions. Ph.D. thesis, University of Waterloo, Waterloo (1992)"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67077-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:44:40Z","timestamp":1710265480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67077-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319670768","9783319670775"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67077-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"7 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}