{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:40:31Z","timestamp":1739997631774,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121784"},{"type":"electronic","value":"9783642121791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12179-1_39","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:23:41Z","timestamp":1270063421000},"page":"472-482","source":"Crossref","is-referenced-by-count":2,"title":["Genetic Algorithms Evolving Quasigroups with Good Pseudorandom Properties"],"prefix":"10.1007","author":[{"given":"V\u00e1clav","family":"Sn\u00e1\u0161el","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Ji\u0159\u00ed","family":"Dvorsk\u00fd","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Eli\u0161ka","family":"Ochodkov\u00e1","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Pavel","family":"Kr\u00f6mer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Jan","family":"Plato\u0161","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Ajith","family":"Abraham","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Knuth, D.E.: The art of computer programming. In: Seminumerical Algorithms, 3rd edn., vol.\u00a02, Addison-Wesley\/Longman Publishing Co., Inc. (1997)"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Marsaglia, G., Tsang, W.W.: Some Difficult-to-pass Tests of Randomness. Journal of Statistical Software\u00a07(i03)","DOI":"10.18637\/jss.v007.i03"},{"key":"39_CR3","unstructured":"Markovski, S.: Quasigroup String Processing and Applications in Cryptography. In: Proceedings 1st Conference of Mathematics and Informatics for Industry, Thessaloniki, Greece, pp. 278\u2013290 (2003)"},{"key":"39_CR4","unstructured":"Dimitrova, V., Markovski, J.: On quasigroup pseudo random sequence generator. In: Manolopoulos, Y., Spirakis, P. (eds.) Proc. of the 1-st Balkan Conference in Informatics, Thessaloniki, November 2004, pp. 393\u2013401 (2004)"},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/4235.585888","volume":"1","author":"T. B\u00e4ck","year":"1997","unstructured":"B\u00e4ck, T., Hammel, U., Schwefel, H.-P.: Evolutionary computation: comments on the history and current state. IEEE Transactions on Evolutionary Computation\u00a01, 3\u201317 (1997)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"39_CR6","unstructured":"Belousov, V.D.: Osnovi teorii kvazigrup i lup, Nauka, Moscow (1967) (in Russian)"},{"key":"39_CR7","unstructured":"Bodenhofer, U.: Genetic Algorithms: Theory and Applications. Lecture Notes, Fuzzy Logic Laboratorium Linz-Hagenberg (Winter 2003\/2004)"},{"key":"39_CR8","unstructured":"Dianati, M., Song, I., Treiber, M.: An introduction to genetic algorithms and evolution strategies, technical report, University of Waterloo, Ontario, N2L 3G1, Canada (July 2002)"},{"key":"39_CR9","unstructured":"D\u00e9nes, J., Keedwell, A.: Latin Squares and their Applications. In: Akad\u00e9miai Kiad\u00f3, Budapest. Academic Press, New York (1974)"},{"issue":"\/107","key":"39_CR10","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/0012-365X(92)90543-O","volume":"106","author":"J. D\u00e9nes","year":"1992","unstructured":"D\u00e9nes, J., Keedwell, A.: A new authentication scheme based on Latin squares. Discrete Mathematics\u00a0(106\/107), 157\u2013161 (1992)","journal-title":"Discrete Mathematics"},{"key":"39_CR11","unstructured":"Dvorsk\u00fd, J., Ochodkov\u00e1, E., Sn\u00e1\u0161el, V.: Hash Functions Based on Large Quasigroups. In: Proceedings of Velikono\u010dn\u00ed kryptologie, Brno, pp. 1\u20138 (2002)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Hilewitz, Y., Shi, Z.J., Lee, R.B.: Comparing fast implementations of bit permutation instructions. In: Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, Pacific Grove, California, USA, November 2004, pp. 1856\u20131863 (2004)","DOI":"10.1109\/ACSSC.2004.1399486"},{"key":"39_CR13","unstructured":"Gligoroski, D., et al.: EdonR cryptographic hash function. Submition to NIST\u2019s SHA-3 hash function competition (2008), http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html"},{"key":"39_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-68351-3_12","volume-title":"New Stream Cipher Designs","author":"D. Gligoroski","year":"2008","unstructured":"Gligoroski, D., Markovski, S., Kocarev, L., Svein, J.: The Stream Cipher Edon80. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 152\u2013169. Springer, Heidelberg (2008)"},{"key":"39_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1007\/978-3-642-01970-8_51","volume-title":"ICCS 2009, Part I","author":"V. Sn\u00e1\u0161el","year":"2009","unstructured":"Sn\u00e1\u0161el, V., Abraham, A., Dvorsk\u00fd, J., Kr\u00f6mer, P., Plato\u0161, J.: Hash functions based on large quasigroups. In: Allen, G., Nabrzyski, J., Seidel, E., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2009, Part I. LNCS, vol.\u00a05544, pp. 521\u2013529. Springer, Heidelberg (2009)"},{"key":"39_CR16","volume-title":"Encyclopedia of Computational Chemistry","author":"G. Jones","year":"1998","unstructured":"Jones, G.: Genetic and evolutionary algorithms. In: von Rague, P. (ed.) Encyclopedia of Computational Chemistry. John Wiley and Sons, Chichester (1998)"},{"key":"39_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/CISIM.2008.64","volume-title":"CISIM 2008: Proceedings of the 2008 7th Computer Information Systems and Industrial Management Applications","author":"S.J. Knapskog","year":"2008","unstructured":"Knapskog, S.J.: New cryptographic primitives. In: CISIM 2008: Proceedings of the 2008 7th Computer Information Systems and Industrial Management Applications, pp. 3\u20137. IEEE Computer Society, Washington (2008)"},{"key":"39_CR18","unstructured":"Koza, J.: Genetic programming: A paradigm for genetically breeding populations of computer programs to solve problems. Technical Report STAN-CS-90-1314, Dept. of Computer Science, Stanford University (1990)"},{"issue":"3","key":"39_CR19","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s00026-005-0261-7","volume":"9","author":"B.D. McKay","year":"2005","unstructured":"McKay, B.D., Wanless, I.M.: On the Number of Latin Squares. Journal Annals of Combinatorics\u00a09(3), 335\u2013344 (2005)","journal-title":"Journal Annals of Combinatorics"},{"key":"39_CR20","unstructured":"Merkle, R.C.: Secrecy, authentication, and public key systems. Stanford Ph.D. thesis, pp. 13-15 (1979), http:\/\/www.merkle.com\/papers\/Thesis1979.pdf"},{"key":"39_CR21","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3927.001.0001","volume-title":"An Introduction to Genetic Algorithms","author":"M. Mitchell","year":"1996","unstructured":"Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Cambridge (1996)"},{"key":"39_CR22","unstructured":"Ochodkov\u00e1, E., Sn\u00e1\u0161el, V.: Using Quasigroups for Secure Encoding of File System. In: Proceedings of the International Scientific NATO PfP\/PWP Conference Security and Information Protection 2001, Brno, Czech Republic, May 9-11, pp. 175\u2013181 (2001)"},{"key":"39_CR23","doi-asserted-by":"crossref","unstructured":"Smith, J.D.H.: An introduction to quasigroups and their representations. Chapman & Hall\/CRC (2007)","DOI":"10.1201\/9781420010633"},{"issue":"1","key":"39_CR24","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.ejor.2004.09.057","volume":"174","author":"L.V. Snyder","year":"2006","unstructured":"Snyder, L.V., Daskin, M.S.: A random-key genetic algorithm for the generalized traveling salesman problem. European Journal of Operational Research\u00a0174(1), 38\u201353 (2006)","journal-title":"European Journal of Operational Research"},{"key":"39_CR25","unstructured":"Vojvoda, M.: Cryptanalysis of One Hash Function Based on quasigroup. In: Conference Mikul\u00e1\u0161sk\u00e1 kryptobes\u00eddka, Praha, pp. 23\u201328 (2003)"},{"key":"39_CR26","unstructured":"TREC Web Corpus: GOV (2009), http:\/\/ir.dcs.gla.ac.uk\/test_collections\/govinfo.html"},{"key":"39_CR27","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/NABIC.2009.5393520","volume-title":"Proceedings of the 2009 World Congress on Nature & Biologically Inspired Computing","author":"V. Sn\u00e1\u0161el","year":"2009","unstructured":"Sn\u00e1\u0161el, V., Abraham, A., Dvorsk\u00fd, J., Ochodkov\u00e1, E., Plato\u0161, J., Kr\u00f6mer, P.: Searching for Quasigroups for Hash Functions with Genetic Algorithms. In: Proceedings of the 2009 World Congress on Nature & Biologically Inspired Computing, pp. 367\u2013372. IEEE Computer Society, Los Alamitos (2009)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12179-1_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:12:18Z","timestamp":1739995938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12179-1_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121784","9783642121791"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12179-1_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}