Evolutionary Computation in computer security and cryptography Julio César Hernández CastroPedro Isasi Viñuela Preface Pages: 193 - 199
Multi-objective optimisation of bijective s-boxes Joanne FullerWilliam MillanEd Dawson Special Issue Pages: 201 - 218
The design of S-boxes by simulated annealing John A. ClarkJeremy L. JacobSusan Stepney Special Issue Pages: 219 - 231
New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA Juliio César Hernández CastroPedro Isasi Viñuela Special Issue Pages: 233 - 243
Block cipher based on reversible cellular automata Marcin SeredynskiPascal Bouvry Special Issue Pages: 245 - 258
Secure evolvable hardware for public-key cryptosystems Nadia NedjahLuiza de Macedo Mourelle Special Issue Pages: 259 - 275