Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Daemen, J. and Rijmen, V., The Design of Rijndael: AES - The Advanced Encryption Standard, Springer-Verlag, 2002.
National Institute of Standard and Technology, Data Encryption Standard, Federal Information Processing Standards 46, November 1977.
Nash, J.F., Equilibrium points in n-person games, Proceedings of the National Academy of Sciences, vol. 36, pp.48-49, 1950.
Nash, J.F., Non-cooperative game, Annals of Mathematics, vol. 54, no. 2, pp. 286-295, 1951.
Kang, J.S., Yi, O., Hong, D. and Cho, H., Pseudo-randomness of MISTY-type transformations and the block cipher KASUMI, Information Security and Privacy, The 6th Australasian Conference, Lecture Notes in Computer Science, vol. 2119, pp. 60-73, Springer-Verlag, 2001.
Menezes A. J., Van Oorschot, P. C. and Vanstone, S. A., Handbook of Applied Cryptography, CRC Press, 1996.
Matsui, M., Linear cryptanalysis method for DES cipher, T. Helleseth (Ed.), Advances in Cryptology, vol. 765, Lecture Notes in Computer Science, pp. 386-397, Springer-Verlag, 1994.
Biham, E. and Shamir, A., Differential Cryptanalysis of DES-like Cryptosystems, Advances of Cryptology, vol. 537,pp. 2-21, Springer-Verlag, 1990.
Beauchamp, K. G., Walsh Functions and Their Applications. New York: Academic, 1975.
Dorigo, M. and Maniezzo, M., Parallel Genetic Algorithms: Introduction and Overview of Current Research, in Parallel Genetic Algorithms, J.Stender (Ed.), IOS Press, 1993.
Millan, W., Burnett, L, Cater, G., Clark, J.A. and Dawson, E., Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes, Lecture Notes in Computer Science, vol. 1726, pp. 263-274, Springer-Verlag, 1999.
Clark, J.A., Jacob, J.L. and Stepney, S., The Design of S-Boxes by Simulated Annealing, New Generation Computing, vol. 23, no. 3, pp. 219-231, Ohmsha and Springer, 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Nedjah, N., Mourelle, L.d.M. (2007). Evolutionary Regular Substitution Boxes. In: Nedjah, N., Abraham, A., Mourelle, L.d.M. (eds) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol 57. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71078-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-71078-3_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71077-6
Online ISBN: 978-3-540-71078-3
eBook Packages: EngineeringEngineering (R0)