{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T04:17:04Z","timestamp":1727497024544},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11424-022-1031-x","type":"journal-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T14:03:24Z","timestamp":1655733804000},"page":"1988-2003","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Straightforward Guess and Determine Analysis Based on Genetic Algorithm"],"prefix":"10.1007","volume":"35","author":[{"given":"Chunping","family":"Cao","sequence":"first","affiliation":[]},{"given":"Zhe","family":"Cen","sequence":"additional","affiliation":[]},{"given":"Xiutao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Zhangyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yamin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"1031_CR1","volume-title":"Analysis of the behavior of a class of genetic adaptive systems","author":"D Jong","year":"1975","unstructured":"Jong D and Alan K, Analysis of the behavior of a class of genetic adaptive systems, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, USA, 1975."},{"issue":"1","key":"1031_CR2","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/3477.484436","volume":"26","author":"M Dorigo","year":"1996","unstructured":"Dorigo M, Maniezzo V, and Colorni A, Ant system: Optimization by a colony of cooperating agents, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 1996, 26(1): 29\u201341.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"issue":"3","key":"1031_CR3","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s007780050040","volume":"6","author":"S Michael","year":"1997","unstructured":"Michael S, Guido M, and Alfons K, Heuristic and randomized optimization for the join ordering problem, The VLDB Journal, 1997, 6(3): 191\u2013208.","journal-title":"The VLDB Journal"},{"issue":"4","key":"1031_CR4","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1080\/0161-119391867999","volume":"17","author":"R Spillman","year":"1993","unstructured":"Spillman R, Cryptanalysis of knapsack ciphers using genetic algorithms, Cryptologia, 1993, 17(4): 367\u2013377.","journal-title":"Cryptologia"},{"key":"1031_CR5","first-page":"650","volume":"1","author":"T L Feng","year":"1995","unstructured":"Feng T L and Cheng Y K, A genetic algorithm for ciphertext-only attack in cryptanalysis, IEEE International Conference on Systems, Man and Cybernetics, 1995, 1: 650\u2013654.","journal-title":"IEEE International Conference on Systems, Man and Cybernetics"},{"key":"1031_CR6","volume-title":"Optimization heuristics for cryptology","author":"D Jong","year":"1998","unstructured":"Jong D and Alan K, Optimization heuristics for cryptology, Queensland University of Technology, Queensland, 1998."},{"key":"1031_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-6089-0","volume-title":"Tabu Search","author":"F Glover","year":"1997","unstructured":"Glover F and Laguna M, Tabu Search, Kluwer Academic Publishers, Boston, 1997."},{"key":"1031_CR8","doi-asserted-by":"crossref","unstructured":"Castro J C H, Sierra J M, Isasi O, et al., Genetic cryptoanalysis of two rounds TEA, International Conference on Computational Science, 2002, 1024\u20131031.","DOI":"10.1007\/3-540-47789-6_108"},{"key":"1031_CR9","doi-asserted-by":"crossref","unstructured":"Yang F, Song J, and Zhang H G, Quantitative cryptanalysis of six-round DES using evolutionary algorithms, International Symposium on Intelligence Computation and Applications, 2008, 134\u2013141.","DOI":"10.1007\/978-3-540-92137-0_15"},{"key":"1031_CR10","unstructured":"Piyush M, Rajesh P, Rajesh S, et al., Application of genetic algorithm in cryptanalysis of mono-alphabetic substitution cipher, International Conference on Computing, Communication and Automation, 2017, 400\u2013405."},{"key":"1031_CR11","first-page":"57","volume":"23","author":"H G Zhang","year":"2002","unstructured":"Zhang H G, Feng X T, Qin Z Q, et al., Evolutionary cryptosystems and evolutionary design for DES, Journal of China Institute Communication, 2002, 23: 57\u201364.","journal-title":"Journal of China Institute Communication"},{"key":"1031_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1504\/IJICS.2009.026620","volume":"3","author":"M Yang","year":"2009","unstructured":"Yang M, Meng Q S, and Zhang H G, The evolutionary design of trace form bent functions in cryptography, International Journal of Information and Computer Security, 2009, 3: 47\u201359.","journal-title":"International Journal of Information and Computer Security"},{"key":"1031_CR13","doi-asserted-by":"crossref","unstructured":"Wang Y H, Wang H Y, Guan A H, et al., Evolutionary design of random number generator, First IITA International Joint Conference on Artificial Intelligence, 2009, 256\u2013259.","DOI":"10.1109\/JCAI.2009.46"},{"issue":"1","key":"1031_CR14","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TC.1985.1676518","volume":"34","author":"T Siegenthaler","year":"1985","unstructured":"Siegenthaler T, Decrypting a class of stream ciphers using ciphertext only, IEEE Transactions on Computers, 1985, 34(1): 81\u201385.","journal-title":"IEEE Transactions on Computers"},{"key":"1031_CR15","doi-asserted-by":"crossref","unstructured":"Goli\u0107 J D, Cryptanalysis of alleged A5 stream cipher, International Conference on the Theory and Applications of Cryptographic Techniques, 1997, 239\u2013255.","DOI":"10.1007\/3-540-69053-0_17"},{"key":"1031_CR16","doi-asserted-by":"crossref","unstructured":"Knudsen L R, Meier W, Preneel B, et al., Analysis methods for (alleged) RC4, International Conference on the Theory and Application of Cryptology and Information Security, 1998, 18\u201322.","DOI":"10.1007\/3-540-49649-1_26"},{"key":"1031_CR17","doi-asserted-by":"crossref","unstructured":"Hawkes P and Rose G G, Analysis methods for (alleged) RC4, Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers, 2000, 303\u2013316.","DOI":"10.1007\/3-540-44448-3_23"},{"issue":"2","key":"1031_CR18","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1049\/iet-ifs.2008.0013","volume":"3","author":"H Ahmadi","year":"2009","unstructured":"Ahmadi H and Eghlidos T, Heuristic guess-and-determine attacks on stream ciphers, IET Information Security, 2009, 3(2): 66\u201373.","journal-title":"IET Information Security"},{"key":"1031_CR19","doi-asserted-by":"crossref","unstructured":"Bouillaguet C, Derbez P, and Fouque P A, Automatic search of attacks on round-reduced AES and applications, CRYPTO 2011, 2011, 169\u2013187.","DOI":"10.1007\/978-3-642-22792-9_10"},{"key":"1031_CR20","doi-asserted-by":"crossref","unstructured":"Huang Z Y and Lin D D, Attacking bivium and trivium with the characteristic set method, Africacrypt 2011, 2011, 77\u201391.","DOI":"10.1007\/978-3-642-21969-6_5"},{"key":"1031_CR21","doi-asserted-by":"crossref","unstructured":"Feng X T, Liu J, Zhou Z C, et al., A Byte-based guess and determine attack on SOSEMANUK, ASIACRYPT 2010, 2010, 146\u2013157.","DOI":"10.1007\/978-3-642-17373-8_9"},{"issue":"6","key":"1031_CR22","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1142\/S0129054111008714","volume":"22","author":"X T Feng","year":"2011","unstructured":"Feng X T, Shi Z Q, Wu C K, et al., On guess and determine analysis of rabbit, International Journal of Foundations of Computer Science, 2011, 22(6): 1283\u20131296.","journal-title":"International Journal of Foundations of Computer Science"},{"key":"1031_CR23","doi-asserted-by":"crossref","unstructured":"Shi Z Q, Feng X T, Feng D G, et al., A real-time key recovery attack on the lightweight stream cipher A2U2, International Conference on Cryptology and Network Security, 2012, 12\u201322.","DOI":"10.1007\/978-3-642-35404-5_2"},{"key":"1031_CR24","unstructured":"Feng X T and Zhang F, A realtime key recovery attack on the authenticated cipher FASER128, IACR Cryptology ePrint Archive, 2014, https:\/\/eprint.iacr.org\/2014\/258."},{"key":"1031_CR25","doi-asserted-by":"crossref","unstructured":"Feng X T and Zhang F, Cryptanalysis on the authenticated cipher Sablier, International Conference on Network and System Security, 2015, 198\u2013208.","DOI":"10.1007\/978-3-319-11698-3_15"},{"key":"1031_CR26","unstructured":"Feng X T, Zhang F, and Wang H, A practical forgery and state recovery attack on the authenticated cipher PANDA-s, IACR Cryptology ePrint Archive, 2014, https:\/\/eprint.iacr.org\/2014\/325."},{"issue":"12","key":"1031_CR27","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1093\/comjnl\/bxaa003","volume":"63","author":"L Jiao","year":"2020","unstructured":"Jiao L, Li Y Q, and Hao Y L, A guess-and-determine attack on SNOW-V stream cipher, The Computer Journal, 2020, 63(12): 1789\u20131812.","journal-title":"The Computer Journal"},{"key":"1031_CR28","doi-asserted-by":"crossref","unstructured":"Pavlenko A, Buzdalov M, and Ulyantsev V, Fitness comparison by statistical testing in construction of SAT-based guess-and-determine cryptographic attacks, GECCO 2019, 2019, 312\u2013320.","DOI":"10.1145\/3321707.3321847"},{"key":"1031_CR29","unstructured":"Cen Z, Feng X T, Wang Z Y, et al., Minimizing deduction system and its application, arxiv, 2020, https:\/\/arxiv.org\/abs\/2006.05833."},{"key":"1031_CR30","doi-asserted-by":"crossref","unstructured":"Ekdahl P and Johansson T, A new version of the stream cipher SNOW, International Workshop on Selected Areas in Cryptography, 2002, 47\u201361.","DOI":"10.1007\/3-540-36492-7_5"},{"key":"1031_CR31","unstructured":"Watanabe D, Okamoto K, and Kaneko T, A hardware-oriented light weight pseudo-random number generator Enocoro-128v2, SCIS 2010, 2010, 3D1\u20133."},{"key":"1031_CR32","doi-asserted-by":"crossref","unstructured":"Canniere H D, Trivium: A stream cipher construction inspired by block cipher design principles, International Conference on Information Security, 2006, 171\u2013186.","DOI":"10.1007\/11836810_13"},{"key":"1031_CR33","volume-title":"New Stream Cipher Design","author":"C D Canni\u00e9re","year":"2008","unstructured":"Canni\u00e9re C D and Preneel B, New Stream Cipher Design, Springer, Berlin, Heidelberg, 2008."},{"key":"1031_CR34","doi-asserted-by":"crossref","unstructured":"E\u00e9n N and S\u00f6rensson N, An extensible sat-solver, International Conference on Theory and Applications of Satisfiability Testing, Springer, 2003, 502\u2013518.","DOI":"10.1007\/978-3-540-24605-3_37"},{"key":"1031_CR35","doi-asserted-by":"crossref","unstructured":"Clegg M, Edmonds J, Impagliazzo R, Using the Groebner basis algorithm to find proofs of unsatisfiability, Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, 1996, 174\u2013183.","DOI":"10.1145\/237814.237860"},{"issue":"2","key":"1031_CR36","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s11424-008-9103-0","volume":"21","author":"F J Chai","year":"2008","unstructured":"Chai F J, Gao X S, and Yuan C M, A characteristic set method for solving boolean equations and applications in cryptanalysis of stream ciphers, Journal of Systems Science & Complexity, 2008, 21(2): 191\u2013208.","journal-title":"Journal of Systems Science & Complexity"},{"key":"1031_CR37","unstructured":"International Standard Organization, ISO\/IEC 180334: Information technology \u2014 Security techniques \u2014 Encryption algorithms \u2014 Part 4: Stream ciphers, 2011."},{"key":"1031_CR38","unstructured":"International Standard Organization, ISO\/IEC 291923: Information technology \u2014 Security techniques \u2014 Encryption algorithms \u2014 Part 3: Stream ciphers, 2012."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-022-1031-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11424-022-1031-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-022-1031-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T09:33:18Z","timestamp":1666085598000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11424-022-1031-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["1031"],"URL":"https:\/\/doi.org\/10.1007\/s11424-022-1031-x","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"type":"print","value":"1009-6124"},{"type":"electronic","value":"1559-7067"}],"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"11 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}