{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:29:02Z","timestamp":1750825742620,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/mipro.2017.7973628","type":"proceedings-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T15:28:35Z","timestamp":1500996515000},"page":"1324-1330","source":"Crossref","is-referenced-by-count":9,"title":["Combinatorial Optimization in Cryptography"],"prefix":"10.23919","author":[{"given":"Karlo","family":"Knezevic","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.10.066"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.10.066"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16501-1_16"},{"journal-title":"Cracking of the merkle-hellman cryptosystem using genetic algorithm","year":"2016","author":"kochladze","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1984.1056964"},{"journal-title":"Knapsack Problems Algorithms and Computer Implementations","year":"1990","author":"martello","key":"ref30"},{"key":"ref37","first-page":"33","article-title":"A Genetic Algorithm for Evolving Plateaued Cryptographic Boolean Functions","author":"mariot","year":"2015","journal-title":"Theory and Practice of Natural Computing - Fourth International Conference TPNC 2015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2764674"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26841-5_6"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754764"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2014.09.003"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33021-6_37"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30698-8_9"},{"key":"ref2","volume":"1","author":"koza","year":"1992","journal-title":"Genetic Programming On the Programming of Computers by Means of Natural Selection"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022602019183"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-6856-5_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511780448.011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511780448.011"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1007\/s11071-014-1591-y","article-title":"Cryptographically secure random number generator with chaotic additional input","volume":"78","author":"ozkaynak","year":"2014","journal-title":"Nonlinear Dynamics"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511780448.012"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.08.023"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05258-3_60"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45823-6_57"},{"key":"ref51","first-page":"37","article-title":"Evolving a computer program to generate random numbers using the genetic programming paradigm","author":"koza","year":"1991","journal-title":"ICGA"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1331075"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2007.05.007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.329691"},{"key":"ref40","article-title":"Immunological algorithms paradigm for construction of boolean functions with good cryptographic properties","author":"picek","year":"2016","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"ref12","first-page":"317","article-title":"Engineering optimizations via nature-inspired virtual bee algorithms","author":"yang","year":"2005","journal-title":"Int Work-Conf on the Interplay between Natural and Artifical Computation"},{"key":"ref13","first-page":"760","article-title":"Particle swarm optimization","author":"kennedy","year":"2011","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59901-9_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12203-3_8"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","author":"katz","year":"2014","journal-title":"Introduction to Modern Cryptography"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref4","volume":"1","author":"fogel","year":"2006","journal-title":"Evolutionary Computation Toward a New Philosophy of Machine Intelligence"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015059928466"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-05094-1","author":"eiben","year":"2003","journal-title":"Introduction to Evolutionary Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/CHNUMINSIGH"},{"key":"ref8","article-title":"A review on the ant colony optimization metaheuristic: Basis, models and new trends","volume":"9","author":"cord\u00f3n garc\u00eda","year":"2002","journal-title":"Mathware & soft computing 2002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17310-3_2"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1162\/EVCO_a_00191"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-007-9049-5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7169071"},{"key":"ref45","first-page":"374","article-title":"Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes","author":"picek","year":"2014","journal-title":"Progress in Cryptology 7th International Conference on Cryptology in India - INDOCRYPT"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2764698"},{"key":"ref47","first-page":"210","article-title":"Modified Transparency Order Property: Solution or Just Another Attempt","author":"picek","year":"2015","journal-title":"Security Privacy and Applied Cryptography Engineering - 5th International Conference SPACE 2015"},{"key":"ref42","first-page":"31","article-title":"Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm","author":"ivanov","year":"2015","journal-title":"Cryptography and Information Security in the Balkans - Second International Conference BalkanCryptSec 2015 Koper Slovenia September 3&#x2013;4 2015 Revised Selected Papers"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-015-0170-5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2014.6855573"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2556315.2556319"}],"event":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2017,5,22]]},"location":"Opatija","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958418\/7973374\/07973628.pdf?arnumber=7973628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T06:16:12Z","timestamp":1602569772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7973628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":52,"URL":"https:\/\/doi.org\/10.23919\/mipro.2017.7973628","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}