[PDF][PDF] A survey on cryptography using optimization algorithms in WSNs

SB Sasi, N Sivanandam - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Objective: The main intent of this research is to provide the secure communication in the
wireless sensor networks. For that, several cryptography using optimization algorithms is …

Computational intelligence applied on cryptology: a brief review

M Danziger, MAA Henriques - IEEE Latin America Transactions, 2012 - ieeexplore.ieee.org
Many cryptographic techniques have been developed and several were broken. Recently,
new models have arisen with different and more complex approaches to cryptography and …

Cryptanalysis of lightweight block ciphers using metaheuristic algorithms in cloud of things (CoT)

MS Jawed, M Sajid - … Conference on data analytics for business …, 2022 - ieeexplore.ieee.org
The Cloud of Things (CoT) has transformed communication and network technologies by
expanding the Iimitation of IoT devices. The Cloud of Things is a fusion of Cloud Computing …

AI‐Enabled Ant‐Routing Protocol to Secure Communication in Flying Networks

S Hussain, A Sami, A Thasin… - … Intelligence and Soft …, 2022 - Wiley Online Library
Artificial intelligence has recently been used in FANET‐based routing strategies for decision‐
making, which is a unique paradigm. For effective communication in flying vehicles that use …

Cryptanalysis of DES-16 using binary firefly algorithm

S Amic, KMS Soyjaudah, H Mohabeer… - … Practices for the …, 2016 - ieeexplore.ieee.org
In this paper, we present a novel approach for the cryptanalysis of Data Encryption Standard
based on Binary Firefly Algorithm using a chosen plaintext attack. The Firefly Algorithm gives …

Application of genetic algorithm in cryptanalysis of mono-alphabetic substitution cipher

PK Mudgal, R Purohit, R Sharma… - 2017 International …, 2017 - ieeexplore.ieee.org
Today, security is a vital concern in computer science, cryptography is used vastly for
implementation of the same. Cryptanalysis is a process in which the security is attempted to …

Dolphin swarm algorithm for cryptanalysis

S Amic, KMS Soyjaudah, G Ramsawock - Information Systems Design …, 2019 - Springer
This work focuses on the application of Dolphin Swarm Algorithm (DSA) to cryptanalysis. It is
a relatively new optimization algorithm that is based on the collective behavior of dolphins to …

Binary cat swarm optimization for cryptanalysis

S Amic, KMS Soyjaudah… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
This research paper investigates the relevance of the Cat Swarm Optimization (CSO)
algorithm to cryptanalysis. It is a relatively new evolutionary metaheuristic technique to solve …

[PDF][PDF] Current trends and future aspects in cross-layer design for the wireless networks

S Sharma, R Mishra, K Singh - … & Information Technology (CS & IT), 2012 - academia.edu
Computer network today are becoming popular day by day in our day to day life. The users
are looking forward to use wireless technologies such as Bluetooth, WLANs based on the …

A few DNA-based security techniques

Q Gao - 2011 IEEE Long Island Systems, Applications and …, 2011 - ieeexplore.ieee.org
Biological systems have been a rich source of inspiration for computer security
professionals. In this paper we briefly review some of the security proposals inspired by …