{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:55Z","timestamp":1750307815954,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,12]],"date-time":"2008-07-12T00:00:00Z","timestamp":1215820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,12]]},"DOI":"10.1145\/1389095.1389297","type":"proceedings-article","created":{"date-parts":[[2008,7,22]],"date-time":"2008-07-22T13:46:39Z","timestamp":1216734399000},"page":"1099-1100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis using genetic algorithms"],"prefix":"10.1145","author":[{"given":"Karel P.","family":"Bergmann","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Renate","family":"Scheidler","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Christian","family":"Jacob","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2008,7,12]]},"reference":[{"key":"e_1_3_2_1_2_1","unstructured":"B. Delman Genetic Algorithms in Cryptography Rochester Institute of Technology 2004  B. Delman Genetic Algorithms in Cryptography Rochester Institute of Technology 2004"},{"volume-title":"FIPS","year":"1977","author":"National Institute of Standards and Technology, FIPS Publication 46","key":"e_1_3_2_1_3_1"},{"volume-title":"FIPS","year":"2001","author":"National Institute of Standards and Technology, FIPS Publication 197","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"W. Friedman The Index of Coincidence and Its Applications in Cryptography. Riverbank Labs 1920  W. Friedman The Index of Coincidence and Its Applications in Cryptography. Riverbank Labs 1920"},{"key":"e_1_3_2_1_6_1","unstructured":"J. H. Holland Adaptation in Natural and Artificial Systems. The University of Michigan Press Ann Arbor MI 1975   J. H. Holland Adaptation in Natural and Artificial Systems. The University of Michigan Press Ann Arbor MI 1975"},{"volume-title":"Handbook of Applied Cryptography. CRC Press","year":"1997","author":"Menezes A. J.","key":"e_1_3_2_1_7_1"}],"event":{"name":"GECCO08: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"],"location":"Atlanta GA USA","acronym":"GECCO08"},"container-title":["Proceedings of the 10th annual conference on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1389095.1389297","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1389095.1389297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:41Z","timestamp":1750255061000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1389095.1389297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,12]]},"references-count":6,"alternative-id":["10.1145\/1389095.1389297","10.1145\/1389095"],"URL":"https:\/\/doi.org\/10.1145\/1389095.1389297","relation":{},"subject":[],"published":{"date-parts":[[2008,7,12]]},"assertion":[{"value":"2008-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}