{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:23:38Z","timestamp":1752283418332,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,7,8]],"date-time":"2009-07-08T00:00:00Z","timestamp":1247011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,7,8]]},"DOI":"10.1145\/1570256.1570294","type":"proceedings-article","created":{"date-parts":[[2009,7,21]],"date-time":"2009-07-21T13:32:17Z","timestamp":1248183137000},"page":"2161-2166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Cryptanalysis of four-rounded DES using binary particleswarm optimization"],"prefix":"10.1145","author":[{"given":"Waseem","family":"Shahzad","sequence":"first","affiliation":[{"name":"FAST National University of Computer and Emerging Sciences, Islamabad, Pakistan"}]},{"given":"Abdul Basit","family":"Siddiqui","sequence":"additional","affiliation":[{"name":"FAST National University of Computer and Emerging Sciences, Islamabad, Pakistan"}]},{"given":"Farrukh Aslam","family":"Khan","sequence":"additional","affiliation":[{"name":"FAST National University of Computer and Emerging Sciences, Islamabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2009,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alfred J. Menezes Paul C. van Oorschot and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press. October 1996.   Alfred J. Menezes Paul C. van Oorschot and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press. October 1996."},{"key":"e_1_3_2_1_2_1","first-page":"2326","volume-title":"Zhangyi Wang. Cryptanalysis of Four-Round DES Based on Genetic Algorithm. International Conference on Wireless Communications, Networking and Mobile Computing WiCom 2007","author":"Song Jun","year":"2007"},{"key":"e_1_3_2_1_3_1","first-page":"823","volume-title":"Nonlinear Analysis","volume":"63","author":"Laskari E.C.","year":"2005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119391867746"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.383.0243"},{"key":"e_1_3_2_1_6_1","first-page":"1024","volume-title":"Pedro Isasi and Arturo Ribagorda. Genetic Cryptoanalysis of Two Rounds TEA. ICCS2002","volume":"2331","author":"Hern\u00e1ndez Castro Julio C\u00e9sar","year":"2002"},{"key":"e_1_3_2_1_7_1","first-page":"258","volume-title":"Clark. Modern Optimisation Algorithms for Cryptanalysis. Proceedings of Second IEEE Australian and New Zealand Conference on Intelligent Information Systems.","author":"Andrew","year":"1994"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11499305_4"},{"key":"e_1_3_2_1_9_1","first-page":"418","volume-title":"Proceedings of Ninth International Symposium on Computers and Communications 2004 (ISCC'04)","volume":"2","author":"Bafghi Abbas Ghaemi"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"Matsui. The First Experimental Cryptanalysis of the Data Encryption Standard. Advances in Cryptology CRYPTO '94","volume":"839","author":"Mitsuru"},{"key":"e_1_3_2_1_11_1","first-page":"45","article-title":"A Study of Heuristic Approaches for Breaking Short Cryptograms, International Journal on Artificial Intelligence Tools. World Scientific Publishing Company. 2004 Vol. 13","volume":"1","author":"Morelli Ralph","year":"2004","journal-title":"No"},{"key":"e_1_3_2_1_12_1","first-page":"471","volume-title":"Wahdan. Genetic Algorithm Cryptanalysis of the Basic Substitution Permutation Network. IEEE International Symposium on Micro-NanoMechatronics and Human Science","author":"Albassal E.M.B","year":"2005"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2004.826076"}],"event":{"name":"GECCO09: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"],"location":"Montreal Qu\u00e9bec Canada","acronym":"GECCO09"},"container-title":["Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1570256.1570294","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1570256.1570294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:53Z","timestamp":1750249073000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1570256.1570294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,8]]},"references-count":13,"alternative-id":["10.1145\/1570256.1570294","10.1145\/1570256"],"URL":"https:\/\/doi.org\/10.1145\/1570256.1570294","relation":{},"subject":[],"published":{"date-parts":[[2009,7,8]]},"assertion":[{"value":"2009-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}