Author:
Domínguez-Isidro Saúl,Mezura-Montes Efrén,Osorio-Hernández Luis-Guillermo
Funder
Mexican Council for Science and Technology (CONACyT)
Subject
Electrical and Electronic Engineering,Artificial Intelligence,Control and Systems Engineering
Reference24 articles.
1. A hardware optimized implementation for the modular exponentiation operator;Bolaños;Dyna,2008
2. Bos, J., Coster, M., 1990. Addition chains heuristics. In: Advanced in cryptology. Proceedings of CRYPTO׳89. Springer-Verlag, pp. 400–407.
3. An artificial immune system heuristic for generating short addition chains;Cruz-Cortés;IEEE Trans. Evol. Comput.,2008
4. Cruz-Cortés, N., Rodríguez-Henríquez, F., Juárez-Morales, R., Coello-Coello, C.A., 2005. Finding optimal addition chains using a genetic algorithm approach. In: Proceedings of the Computational Intelligence and Security Conference (CIS׳2005). Springer-Verlag, pp. 208–215.
5. The ant system;Dorigo;IEEE Trans. Syst. Man Cybern. B,1996
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design and Analysis of RSA and Paillier Homomorphic Cryptosystems Using PSO-Based Evolutionary Computation;IEEE Transactions on Computers;2023
2. Evolutionary computation and machine learning in security;Proceedings of the Genetic and Evolutionary Computation Conference Companion;2022-07-09
3. Evolutionary computation and machine learning in cryptology;Proceedings of the Genetic and Evolutionary Computation Conference Companion;2021-07-07
4. Evolutionary computation and machine learning in cryptology;Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion;2020-07-08
5. Minimum Addition Chains Generation Using Evolutionary Strategies;Computación y Sistemas;2018-12-31