Pretražite po imenu i prezimenu autora, mentora, urednika, prevoditelja

Napredna pretraga

Pregled bibliografske jedinice broj: 863926

Evolutionary Computation and Cryptology


Picek, Stjepan
Evolutionary Computation and Cryptology // Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion
New York (NY): The Association for Computing Machinery (ACM), 2016. str. 883-909 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)


CROSBI ID: 863926 Za ispravke kontaktirajte CROSBI podršku putem web obrasca

Naslov
Evolutionary Computation and Cryptology

Autori
Picek, Stjepan

Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni

Izvornik
Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion / - New York (NY) : The Association for Computing Machinery (ACM), 2016, 883-909

Skup
GECCO

Mjesto i datum
Denver (CO), Sjedinjene Američke Države, 20.07.2016. - 24.07.2016

Vrsta sudjelovanja
Predavanje

Vrsta recenzije
Međunarodna recenzija

Ključne riječi
Evolutionary computation ; Cryptology

Sažetak
Evolutionary Computation (EC) has been used with great success on various real-world problems. One domain abundant with numerous difficult problems is cryptology. Cryptology can be divided into cryptography, that informally speaking considers methods how to ensure secrecy (but also authenticity, privacy, etc.), and cryptanalysis, that deals with methods how to break cryptographic systems. Although not always in an obvious way, EC can be applied to problems from both domains. This tutorial will first give a brief introduction to cryptology intended for general audience (therefore, omitting proofs and mathematics behind many concepts). Afterwards, we concentrate on several topics from cryptography that are successfully tackled up to now with EC and discuss why those topics are suitable to apply EC. However, care must be taken since there exists a number of problems that seem to be impossible to solve with EC and one needs to realize the limitations of the heuristics. We will discuss the choice of appropriate EC techniques (GA, GP, CGP, ES, multi-objective optimization, etc) for various problems and evaluate on the importance of that choice. Furthermore, we will discuss the gap between the cryptographic community and EC community and what does that mean for the results. By doing that, we will give a special emphasis on the perspective that cryptography presents a source of benchmark problems for the EC community. To conclude, we will present a number of topics we consider to be a strong research choice that can have a real-world impact. In that part, we give a special attention to cryptographic problems where cryptographic community successfully applied EC, but where those problems remained out of the focus of EC community. This tutorial will also present some live demos of EC in action when dealing with cryptographic problems. We will present several problems, ways of encoding solutions, impact of the algorithms choice and finally, we will run some experiments to show the results and discuss how to assess them from cryptographic perspective.

Izvorni jezik
Engleski

Znanstvena područja
Računarstvo



POVEZANOST RADA


Profili:

Avatar Url Stjepan Picek (autor)


Citiraj ovu publikaciju:

Picek, Stjepan
Evolutionary Computation and Cryptology // Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion
New York (NY): The Association for Computing Machinery (ACM), 2016. str. 883-909 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
Picek, S. (2016) Evolutionary Computation and Cryptology. U: Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion.
@article{article, author = {Picek, Stjepan}, year = {2016}, pages = {883-909}, keywords = {Evolutionary computation, Cryptology}, title = {Evolutionary Computation and Cryptology}, keyword = {Evolutionary computation, Cryptology}, publisher = {The Association for Computing Machinery (ACM)}, publisherplace = {Denver (CO), Sjedinjene Ameri\v{c}ke Dr\v{z}ave} }
@article{article, author = {Picek, Stjepan}, year = {2016}, pages = {883-909}, keywords = {Evolutionary computation, Cryptology}, title = {Evolutionary Computation and Cryptology}, keyword = {Evolutionary computation, Cryptology}, publisher = {The Association for Computing Machinery (ACM)}, publisherplace = {Denver (CO), Sjedinjene Ameri\v{c}ke Dr\v{z}ave} }




Contrast
Increase Font
Decrease Font
Dyslexic Font