Genetic transformation techniques in cryptanalysis U Boryczka, K Dworak Intelligent Information and Database Systems: 6th Asian Conference, ACIIDS …, 2014 | 18 | 2014 |
Cryptanalysis of SDES using genetic and memetic algorithms K Dworak, J Nalepa, U Boryczka, M Kawulok Recent Developments in Intelligent Information and Database Systems, 3-14, 2016 | 13 | 2016 |
Breaking data encryption standard with a reduced number of rounds using metaheuristics differential cryptanalysis K Dworak, U Boryczka Entropy 23 (12), 1697, 2021 | 11 | 2021 |
Cryptanalysis of transposition cipher using evolutionary algorithms U Boryczka, K Dworak Computational Collective Intelligence. Technologies and Applications: 6th …, 2014 | 11 | 2014 |
Cryptanalysis of SDES using modified version of binary particle swarm optimization K Dworak, U Boryczka Computational Collective Intelligence: 7th International Conference, ICCCI …, 2015 | 10 | 2015 |
Genetic algorithm as optimization tool for differential cryptanalysis of DES6 K Dworak, U Boryczka Computational Collective Intelligence: 9th International Conference, ICCCI …, 2017 | 9 | 2017 |
Differential cryptanalysis of FEAL4 using evolutionary algorithm K Dworak, U Boryczka Computational Collective Intelligence: 8th International Conference, ICCCI …, 2016 | 8 | 2016 |
Using differential evolution with a simple hybrid feature for personalized recommendation M Bałchanowski, U Boryczka, K Dworak Intelligent Information and Database Systems: 10th Asian Conference, ACIIDS …, 2018 | 2 | 2018 |
Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms K Dworak, U Boryczka Intelligent Information and Database Systems: 11th Asian Conference, ACIIDS …, 2019 | 1 | 2019 |
Problem outline K Dworak, J Nalepa, U Boryczka, M Kawulok | | |