{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:56:19Z","timestamp":1772024179300,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540745808","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74581-5_64","type":"book-chapter","created":{"date-parts":[[2007,8,25]],"date-time":"2007-08-25T04:20:21Z","timestamp":1188015621000},"page":"583-590","source":"Crossref","is-referenced-by-count":4,"title":["Cryptanalysis of Two-Round DES Using Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Jun","family":"Song","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huanguo","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qingshu","family":"Meng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhangyi","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"64_CR1","volume-title":"Adaptation in Natural and Artificial Systems","author":"J.H. Holland","year":"1975","unstructured":"Holland, J.H.: Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Arbor, MI (1975)"},{"key":"64_CR2","volume-title":"Genetic algorithms in search, optimization, and machine learning","author":"D.E. Gold","year":"1989","unstructured":"Gold, D.E.: Genetic algorithms in search, optimization, and machine learning. Addison-Wesley, Reading, MA (1989)"},{"key":"64_CR3","volume-title":"Nature-Inspired Cryptography: Past, Present and Future","author":"J.A. Clark","year":"2003","unstructured":"Clark, J.A.: Invited Paper. In: Nature-Inspired Cryptography: Past, Present and Future. CEC-2003, Canberra, Australia, December 2003, IEEE, Los Alamitos (2003)"},{"issue":"4","key":"64_CR4","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1080\/0161-119391867999","volume":"XVII","author":"R. Spillman","year":"1993","unstructured":"Spillman, R.: Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms. Cryptologia\u00a0XVII(4), 367\u2013377 (1993)","journal-title":"Cryptologia"},{"issue":"1","key":"64_CR5","first-page":"187","volume":"XVII","author":"R. Spillman","year":"1993","unstructured":"Spillman, R., Janssen, M., Nelson, B., Kepner, M.: Use of A Genetic Algorithm in the Cryptanalysis of simple substitution Ciphers. Cryptologia\u00a0XVII(1), 187\u2013201 (1993)","journal-title":"Cryptologia"},{"key":"64_CR6","first-page":"258","volume-title":"Modern Optimisation Algorithms for Cryptanalysis","author":"A. Clark","year":"1994","unstructured":"Clark, A.: Modern Optimisation Algorithms for Cryptanalysis, pp. 258\u2013262. IEEE, Los Alamitos (1994)"},{"key":"64_CR7","first-page":"650","volume-title":"A Genetic Algorithm for Ciphertext-Only Attack in Cryptanalysis","author":"F.-T. Lin","year":"1995","unstructured":"Lin, F.-T., Kao, C.-Y.: A Genetic Algorithm for Ciphertext-Only Attack in Cryptanalysis, pp. 650\u2013654. IEEE, Los Alamitos (1995)"},{"key":"64_CR8","first-page":"63","volume":"28","author":"A. Clark","year":"1998","unstructured":"Clark, A., Dawson, E.: Optimisation Heuristics for the Automated Cryptanalysis of Classical Ciphers. Journal of Combinatorial Mathematics and Combinatorial Computing, Papers in honour of Anne Penfold Street\u00a028, 63\u201386 (1998)","journal-title":"Journal of Combinatorial Mathematics and Combinatorial Computing, Papers in honour of Anne Penfold Street"},{"key":"64_CR9","unstructured":"Clark, A.J.: Optimisation Heuristics for Cryptology, PhD thesis, Queensland. University of Technology (1998)"},{"key":"64_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1024","DOI":"10.1007\/3-540-47789-6_108","volume-title":"Computational Science - ICCS 2002","author":"J.C. Hern\u00e1ndez","year":"2002","unstructured":"Hern\u00e1ndez, J.C., et al.: Genetic Cryptoanalysis of Two Rounds TEA. In: Sloot, P.M.A., Tan, C.J.K., Dongarra, J.J., Hoekstra, A.G. (eds.) Computational Science - ICCS 2002. LNCS, vol.\u00a02331, pp. 1024\u20131031. Springer, Heidelberg (2002)"},{"key":"64_CR11","first-page":"823","volume-title":"Evolutionary computation based cryptanalysis: A first study","author":"E.C. Laskari","year":"2005","unstructured":"Laskari, E.C., Meletiouc, G.C., Stamatioud, Y.C., Vrahatis, M.N.: Evolutionary computation based cryptanalysis: A first study, pp. 823\u2013830. Elsevier, Amsterdam (2005)"},{"key":"64_CR12","first-page":"535","volume-title":"Easing collision finding in cryptographic primitives with genetic algorithms","author":"J.C. Hern\u00e1ndez","year":"2002","unstructured":"Hern\u00e1ndez, J.C., et al.: Easing collision finding in cryptographic primitives with genetic algorithms, pp. 535\u2013539. IEEE, Los Alamitos (2002)"},{"key":"64_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/3-540-45105-6_16","volume-title":"Genetic and Evolutionary Computation - GECCO 2003","author":"M. Russell","year":"2003","unstructured":"Russell, M., Clark, J.A., Stepney, S.: Using Ants to Attack a Classical Cipher. In: Cant\u00fa-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O\u2019Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol.\u00a02723, pp. 146\u2013147. Springer, Heidelberg (2003)"},{"issue":"1","key":"64_CR14","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1142\/S0218213004001417","volume":"13","author":"R. Morelli","year":"2004","unstructured":"Morelli, R., Walde, R., Servos, W.: A Study of Heuristic Approaches for Breaking short Cryptograms. International Journal on Artificial Intelligence Tools\u00a013(1), 45\u201364 (2004)","journal-title":"International Journal on Artificial Intelligence Tools"},{"key":"64_CR15","first-page":"418","volume-title":"Finding Suitable Differential Characteristics for Block Ciphers with Ant Colony Technique","author":"A.G. Bafghi","year":"2004","unstructured":"Bafghi, A.G., Sadeghiyan, B.: Finding Suitable Differential Characteristics for Block Ciphers with Ant Colony Technique, pp. 418\u2013423. IEEE, Los Alamitos (2004)"},{"key":"64_CR16","first-page":"1533","volume-title":"The Design of S-Boxes by Simulated Annealing","author":"J.A. Clark","year":"2004","unstructured":"Clark, J.A., Jacob, J.L., Stepney, S.: The Design of S-Boxes by Simulated Annealing, pp. 1533\u20131537. IEEE, Los Alamitos (2004)"},{"key":"64_CR17","first-page":"471","volume-title":"Genetic Algorithm Cryptanalysis Of The Basic Substitution Permutation Network","author":"E.A.M.B. Albassal","year":"2004","unstructured":"Albassal, E.A.M.B., Abdel-Moneim, A.W.: Genetic Algorithm Cryptanalysis Of The Basic Substitution Permutation Network, pp. 471\u2013475. IEEE, Los Alamitos (2004)"},{"key":"64_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/11499305_4","volume-title":"Artificial Intelligence and Knowledge Engineering Applications: A Bioinspired Approach","author":"M.A. Garici","year":"2005","unstructured":"Garici, M.A., Drias, H.: Cryptanalysis of Substitution Ciphers Using Scatter Search. In: Mira, J.M., \u00c1lvarez, J.R. (eds.) IWINAC 2005. LNCS, vol.\u00a03562, pp. 31\u201340. Springer, Heidelberg (2005)"},{"issue":"3","key":"64_CR19","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development\u00a038(3), 243\u2013250 (1994)","journal-title":"IBM Journal of Research and Development"},{"key":"64_CR20","unstructured":"National Bureau of Standards: Data Encryption Standard, FIPS-Pub.46. National Bureau of Standards, US Department of Commerce, Washington DC (1977)"},{"issue":"6","key":"64_CR21","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"Diffie, W., Hellman, M.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. IEEE Computer\u00a010(6), 74\u201384 (1977)","journal-title":"IEEE Computer"},{"key":"64_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"64_CR23","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: The First Experimental Cryptanalysis of the Data Encryption Standard. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 1\u201311. Springer, Heidelberg (1994)"},{"key":"64_CR24","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)"},{"key":"64_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/3-540-36178-2_16","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"E. Biham","year":"2002","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Enhancing Differential-Linear Cryptanalysis. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 254\u2013266. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computation and Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74581-5_64.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:26:35Z","timestamp":1619504795000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74581-5_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745808"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74581-5_64","relation":{},"subject":[]}}