Author of the publication

Evolving hash functions by means of genetic programming

, , , and . GECCO 2006: Proceedings of the 8th annual conference on Genetic and evolutionary computation, 2, page 1861--1862. Seattle, Washington, USA, ACM Press, (8-12 July 2006)
DOI: doi:10.1145/1143997.1144300

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolving hash functions by means of genetic programming, , , and . GECCO 2006: Proceedings of the 8th annual conference on Genetic and evolutionary computation, 2, page 1861--1862. Seattle, Washington, USA, ACM Press, (8-12 July 2006)Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming, , , and . Parallel Problem Solving from Nature - PPSN IX, volume 4193 of LNCS, page 818--827. Reykjavik, Iceland, Springer-Verlag, (9-13 September 2006)Fuzzy logic on decision model for IDS., , and . FUZZ-IEEE, page 1237-1242. IEEE, (2003)Evolution, Detection and Analysis of Malware for Smart Devices., , , and . IEEE Commun. Surv. Tutorials, 16 (2): 961-987 (2014)Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers., , , , and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 374-377. Springer, (2001)Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard., , , and . Comput. Stand. Interfaces, 31 (2): 372-380 (2009)A Multi-party Rational Exchange Protocol., , , and . OTM Workshops (1), volume 4805 of Lecture Notes in Computer Science, page 42-43. Springer, (2007)Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial Proposal., , , and . INC, page 159-168. University of Plymouth, (2010)Protection of Multiagent Systems., , , and . ICCSA (3), volume 2669 of Lecture Notes in Computer Science, page 123-128. Springer, (2003)Leveraging User-related Internet of Things for Continuous Authentication: A Survey., , and . ACM Comput. Surv., 52 (3): 53:1-53:38 (2019)