How to cite this paper
Sadeghzadeh, M & Taherbaghal, M. (2014). A new method for decoding an encrypted text by genetic algorithms and its comparison with tabu search and simulated annealing.Management Science Letters , 4(2), 213-220.
Refrences
Albassall, A. M. B., & Wahdan, A. (2004, September). Genetic algorithm cryptanalysis of a feistel type block cipher. In Electrical, Electronic and Computer Engineering, 2004. ICEEC & apos; 04. 2004 International Conference on (pp. 217-221). IEEE.
Clark, A. J. (1998a). Optimisation heuristics for cryptology, PhD. Thesis.
Clark, A. J. (1988b). Physical protection of cryptographic devices. Advances in Cryptology—EUROCRYPT’87 (pp. 83-93). Springer Berlin Heidelberg.
Garg, P. (2006). Genetic algorithm attack on simplified data encryption standard algorithm. Special Issue: Advances in Computer Science and Engineering, 23, 139-174.
Verma, A. K., Dave, M., & Joshi, R. C. (2007). Genetic Algorithm and Tabu Search Attack on the Mono-Alphabetic Subsitution Cipher in Adhoc Networks.Journal of Computer science, 3(3), 134.
Glover, F. (1990). Tabu search—part II. ORSA Journal on computing, 2(1), 4-32.
Glover, F., & Laguna, M. (1997). Tabu search (Vol. 22). Boston: Kluwer academic publishers.
Glover, F., & Taillard, E. (1993). A user & apos; s guide to tabu search. Annals of operations research, 41(1), 1-28.
Grundlingh, W., & Van Vuuren, J. H. (2003). Using Genetic Algorithms to Break a Simple Cryptographic Cipher. Retrieved March, 31.
Holland, J. H. (1975). Adaption in Natural and Artificial Systems. Ann Arbor, Michigan: University of Michigan Pres.
Yaseen, I. F., & Sahasrabuddhe, H. V. (1999). A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC). Computational Intelligence and Multimedia Applications, 1999. ICCIMA & apos; 99. Proceedings. Third International Conference on (pp. 81-85). IEEE.
Kolodziejczyk, J. (1997). The Application of Genetic Algorithm in Crptoanalysis of Knapsack Cipher. In European School on Genetic Algorithms, Eurogen97.
Matthews, R. A. (1993). The use of genetic algorithms in cryptanalysis.Cryptologia, 17(2), 187-201.
Kirkpatrick, S. (1984). Optimization by simulated annealing: Quantitative studies. Journal of statistical physics, 34(5-6), 975-986.
Spears, W. M., De Jong, K. A., B?ck, T., Fogel, D. B., & De Garis, H. (1993, January). An overview of evolutionary computation. In Machine Learning: ECML-93 (pp. 442-459). Springer Berlin Heidelberg.
Spillman, R., Janssen, M., Nelson, B., & Kepner, M. (1993). Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia, 17(1), 31-44.
William, S., & Stallings, W. (2006). Cryptography and Network Security, 4/E. Pearson Education India.
Clark, A. J. (1998a). Optimisation heuristics for cryptology, PhD. Thesis.
Clark, A. J. (1988b). Physical protection of cryptographic devices. Advances in Cryptology—EUROCRYPT’87 (pp. 83-93). Springer Berlin Heidelberg.
Garg, P. (2006). Genetic algorithm attack on simplified data encryption standard algorithm. Special Issue: Advances in Computer Science and Engineering, 23, 139-174.
Verma, A. K., Dave, M., & Joshi, R. C. (2007). Genetic Algorithm and Tabu Search Attack on the Mono-Alphabetic Subsitution Cipher in Adhoc Networks.Journal of Computer science, 3(3), 134.
Glover, F. (1990). Tabu search—part II. ORSA Journal on computing, 2(1), 4-32.
Glover, F., & Laguna, M. (1997). Tabu search (Vol. 22). Boston: Kluwer academic publishers.
Glover, F., & Taillard, E. (1993). A user & apos; s guide to tabu search. Annals of operations research, 41(1), 1-28.
Grundlingh, W., & Van Vuuren, J. H. (2003). Using Genetic Algorithms to Break a Simple Cryptographic Cipher. Retrieved March, 31.
Holland, J. H. (1975). Adaption in Natural and Artificial Systems. Ann Arbor, Michigan: University of Michigan Pres.
Yaseen, I. F., & Sahasrabuddhe, H. V. (1999). A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC). Computational Intelligence and Multimedia Applications, 1999. ICCIMA & apos; 99. Proceedings. Third International Conference on (pp. 81-85). IEEE.
Kolodziejczyk, J. (1997). The Application of Genetic Algorithm in Crptoanalysis of Knapsack Cipher. In European School on Genetic Algorithms, Eurogen97.
Matthews, R. A. (1993). The use of genetic algorithms in cryptanalysis.Cryptologia, 17(2), 187-201.
Kirkpatrick, S. (1984). Optimization by simulated annealing: Quantitative studies. Journal of statistical physics, 34(5-6), 975-986.
Spears, W. M., De Jong, K. A., B?ck, T., Fogel, D. B., & De Garis, H. (1993, January). An overview of evolutionary computation. In Machine Learning: ECML-93 (pp. 442-459). Springer Berlin Heidelberg.
Spillman, R., Janssen, M., Nelson, B., & Kepner, M. (1993). Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia, 17(1), 31-44.
William, S., & Stallings, W. (2006). Cryptography and Network Security, 4/E. Pearson Education India.