{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T14:27:06Z","timestamp":1747319226614,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cec.2006.1688376","type":"proceedings-article","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T13:01:13Z","timestamp":1158930073000},"page":"677-680","source":"Crossref","is-referenced-by-count":14,"title":["Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization"],"prefix":"10.1109","author":[{"given":"M.F.","family":"Uddin","sequence":"first","affiliation":[]},{"given":"A.M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Problems of Cryptography as Discrete Optimization Tasks","volume":"63","author":"laskariab","year":"2005","journal-title":"Nonlinear Analysis Theory Methods and Applications"},{"key":"17","first-page":"243","article-title":"Swarm intelligence for permutation optimization: A case study of n-queens problem","author":"hu","year":"2003","journal-title":"Proc 2003 IEEE Swarm Intell Symp"},{"key":"18","article-title":"Evolutionary Computation Based Cryptanalysis: A First Study","volume":"63","author":"laskariab","year":"2005","journal-title":"Nonlinear Analysis Theory Methods and Applications"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299423"},{"key":"14","article-title":"An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers","author":"faisal uddin","year":"2006","journal-title":"Proc of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119591883944"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/182987.184078"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1080\/0161-119291866801","article-title":"Al-Kindi: The origins of cryptology: The Arab contributions","volume":"16","author":"ibraham","year":"1992","journal-title":"Cryptologia"},{"journal-title":"The Code breakers The story of secret writing","year":"1996","author":"kahn","key":"1"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119391868033"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118691861001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359174"},{"article-title":"Optimisation Heuristics for Cryptology","year":"1998","author":"clerk","key":"4"},{"key":"9","first-page":"219","article-title":"An implementation of probabilistic relaxation in the cryptanalysis of simple substitution systems","volume":"16","author":"bahler","year":"1992","journal-title":"Cryptologia"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119391867746"}],"event":{"name":"2006 IEEE International Conference on Evolutionary Computation","location":"Vancouver, BC, Canada"},"container-title":["2006 IEEE International Conference on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11108\/35623\/01688376.pdf?arnumber=1688376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T05:30:06Z","timestamp":1497677406000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1688376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cec.2006.1688376","relation":{},"subject":[]}}