关注
Kamil Dworak
Kamil Dworak
在 us.edu.pl 的电子邮件经过验证
标题
引用次数
引用次数
年份
Genetic transformation techniques in cryptanalysis
U Boryczka, K Dworak
Intelligent Information and Database Systems: 6th Asian Conference, ACIIDS …, 2014
182014
Cryptanalysis of SDES using genetic and memetic algorithms
K Dworak, J Nalepa, U Boryczka, M Kawulok
Recent Developments in Intelligent Information and Database Systems, 3-14, 2016
132016
Breaking data encryption standard with a reduced number of rounds using metaheuristics differential cryptanalysis
K Dworak, U Boryczka
Entropy 23 (12), 1697, 2021
112021
Cryptanalysis of transposition cipher using evolutionary algorithms
U Boryczka, K Dworak
Computational Collective Intelligence. Technologies and Applications: 6th …, 2014
112014
Cryptanalysis of SDES using modified version of binary particle swarm optimization
K Dworak, U Boryczka
Computational Collective Intelligence: 7th International Conference, ICCCI …, 2015
102015
Genetic algorithm as optimization tool for differential cryptanalysis of DES6
K Dworak, U Boryczka
Computational Collective Intelligence: 9th International Conference, ICCCI …, 2017
92017
Differential cryptanalysis of FEAL4 using evolutionary algorithm
K Dworak, U Boryczka
Computational Collective Intelligence: 8th International Conference, ICCCI …, 2016
82016
Using differential evolution with a simple hybrid feature for personalized recommendation
M Bałchanowski, U Boryczka, K Dworak
Intelligent Information and Database Systems: 10th Asian Conference, ACIIDS …, 2018
22018
Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms
K Dworak, U Boryczka
Intelligent Information and Database Systems: 11th Asian Conference, ACIIDS …, 2019
12019
Problem outline
K Dworak, J Nalepa, U Boryczka, M Kawulok
系统目前无法执行此操作,请稍后再试。
文章 1–10