Cryptanalysis using biological inspired computing approaches
In security, cryptology is introduced to guarantee the safety of data, whereby it is divided into cryptography and cryptanalysis. Cryptography is a technique to conceal information by means of encryption and decryption while cryptanalysis is used to break the encrypted information using some methods...
| Main Authors: | Ahmad, Badrisham, Maarof, Mohd. Aizaini |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/7801/ http://eprints.utm.my/7801/1/MohdAizainiMaarof2006_CryptanalysisusingBiologicalInspiredComputing.pdf |
Similar Items
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
Biologically Inspired Object Recognition System
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
A BIOLOGICALLY INSPIRED OBJECT RECOGNITION SYSTEM
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
Biologically-Inspired Modeling of Filtering Noise in Signal Sound
by: Hammuzamer , Irwan, et al.
Published: (2009)
by: Hammuzamer , Irwan, et al.
Published: (2009)
A Proposed Biologically Inspired Model for Object Recognition
by: Hamada , R. H. Al-Absi, et al.
Published: (2009)
by: Hamada , R. H. Al-Absi, et al.
Published: (2009)
Biologically-Inspired Abstraction Model to Analyze Sound Signal
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2008)
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2008)
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
A Proposed Model of Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer , Irwan, et al.
Published: (2009)
by: Hammuzamer , Irwan, et al.
Published: (2009)
A Proposed Biologically-Inspired Model to Analyze Signal Sound
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
Biologically Inspired Signal Noise Elimination Using Human Ear Model with Concurrent Algorithm
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2008)
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2008)
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
A New Abstraction Model for Biologically- Inspired Sound Signal Analyzer
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
by: Taha, Imad, et al.
Published: (1999)
by: Taha, Imad, et al.
Published: (1999)
A Proposed Application Model for a Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer, Irwan, et al.
Published: (2009)
by: Hammuzamer, Irwan, et al.
Published: (2009)
A Proposed Application Model for a Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2009)
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2009)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
An approach of bio-inspired generalized shape for writer identification
by: Muda , Azah Kamilah, et al.
Published: (2006)
by: Muda , Azah Kamilah, et al.
Published: (2006)
Biologically-Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network
by: Vasaki , Ponnusamy, et al.
Published: (2010)
by: Vasaki , Ponnusamy, et al.
Published: (2010)
Layered biologically inspired self-healing software system architecture
by: Azween, Abdullah, et al.
Published: (2008)
by: Azween, Abdullah, et al.
Published: (2008)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Similar Items
-
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006) -
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005) -
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006) -
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006) -
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)