{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:49Z","timestamp":1750221169329,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T00:00:00Z","timestamp":1530489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,2]]},"DOI":"10.1145\/3205455.3205518","type":"proceedings-article","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T19:13:06Z","timestamp":1533755586000},"page":"1302-1309","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Evolving boolean functions for fast and efficient randomness testing"],"prefix":"10.1145","author":[{"given":"Vojtech","family":"Mrazek","sequence":"first","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]},{"given":"Marek","family":"Sys","sequence":"additional","affiliation":[{"name":"Masaryk University, Brno, Czech Republic"}]},{"given":"Zdenek","family":"Vasicek","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]},{"given":"Lukas","family":"Sekanina","sequence":"additional","affiliation":[{"name":"Brno University of Technology, Brno, Czech Republic"}]},{"given":"Vashek","family":"Matyas","sequence":"additional","affiliation":[{"name":"Masaryk University, Brno, Czech Republic"}]}],"member":"320","published-online":{"date-parts":[[2018,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Dieharder: A random number test suite 3.31.1","author":"Brown Robert G","year":"2013","unstructured":"Robert G Brown, Dirk Eddelbuettel, and David Bauer. 2013. Dieharder: A random number test suite 3.31.1. http:\/\/www.phy.duke.edu\/~rgb\/General\/dieharder.php (2013)."},{"key":"e_1_3_2_1_2_1","unstructured":"R. Ebendt G. Fey and R. Drechsler. 2000. Advanced BDD Optimization. Springer."},{"volume-title":"2017 IEEE Congress on Evolutionary Computation (CEC). IEEE, 1420--1427","author":"Hernandez-Castro J.","key":"e_1_3_2_1_3_1","unstructured":"J. Hernandez-Castro and D. F. Barrero. 2017. Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery. In 2017 IEEE Congress on Evolutionary Computation (CEC). IEEE, 1420--1427."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688308"},{"volume-title":"Parallel Problem Solving from","author":"Hrbacek Radek","key":"e_1_3_2_1_5_1","unstructured":"Radek Hrbacek and Vaclav Dvorak. 2014. Bent Function Synthesis by Means of Cartesian Genetic Programming. In Parallel Problem Solving from Nature - PPSN XIII. Springer Verlag, 414--423."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-015-0170-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1268776.1268777"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133969"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908961.2927003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1162\/EVCO_a_00190"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45823-6_57"},{"key":"e_1_3_2_1_12_1","unstructured":"A. Rukhin. 2010. A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications Version STS-2.1. NIST Special Publication 800-22rev1a."},{"key":"e_1_3_2_1_13_1","volume-title":"Towards Cryptographic Function Distinguishers with Evolutionary Circuits. In SECRYPT 2013 - Proc. 10th Int. Conf. on Security and Cryptography. SciTePress, 135--146","author":"Svenda Petr","year":"2013","unstructured":"Petr Svenda, Martin Ukrop, and Vashek Matyas. 2013. Towards Cryptographic Function Distinguishers with Evolutionary Circuits. In SECRYPT 2013 - Proc. 10th Int. Conf. on Security and Cryptography. SciTePress, 135--146."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006425100920103"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.888056"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831150"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCAI.2009.46"}],"event":{"name":"GECCO '18: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Kyoto Japan","acronym":"GECCO '18"},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205455.3205518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3205455.3205518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:56Z","timestamp":1750208936000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205455.3205518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,2]]},"references-count":18,"alternative-id":["10.1145\/3205455.3205518","10.1145\/3205455"],"URL":"https:\/\/doi.org\/10.1145\/3205455.3205518","relation":{},"subject":[],"published":{"date-parts":[[2018,7,2]]},"assertion":[{"value":"2018-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}