CAO Chunping1, CEN Zhe1, FENG Xiutao2, WANG Zhangyi3, ZHU Yamin4
|  Jong D and Alan K, Analysis of the behavior of a class of genetic adaptive systems, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, USA, 1975.
 Dorigo M, Maniezzo V, and Colorni A, Ant system:Optimization by a colony of cooperating agents, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 1996, 26(1):29-41.
 Michael S, Guido M, and Alfons K, Heuristic and randomized optimization for the join ordering problem, The VLDB Journal, 1997, 6(3):191-208.
 Spillman R, Cryptanalysis of knapsack ciphers using genetic algorithms, Cryptologia, 1993, 17(4):367-377.
 Feng T L and Cheng Y K, A genetic algorithm for ciphertext-only attack in cryptanalysis, IEEE International Conference on Systems, Man and Cybernetics, 1995, 1:650-654.
 Jong D and Alan K, Optimization heuristics for cryptology, Queensland University of Technology, Queensland, 1998.
 Glover F and Laguna M, Tabu Search, Kluwer Academic Publishers, Boston, 1997.
 Castro J C H, Sierra J M, Isasi O, et al., Genetic cryptoanalysis of two rounds TEA, International Conference on Computational Science, 2002, 1024-1031.
 Yang F, Song J, and Zhang H G, Quantitative cryptanalysis of six-round DES using evolutionary algorithms, International Symposium on Intelligence Computation and Applications, 2008, 134-141.
 Piyush M, Rajesh P, Rajesh S, et al., Application of genetic algorithm in cryptanalysis of monoalphabetic substitution cipher, International Conference on Computing, Communication and Automation, 2017, 400-405.
 Zhang H G, Feng X T, Qin Z Q, et al., Evolutionary cryptosystems and evolutionary design for DES, Journal of China Institute Communication, 2002, 23:57-64.
 Yang M, Meng Q S, and Zhang H G, The evolutionary design of trace form bent functions in cryptography, International Journal of Information and Computer Security, 2009, 3:47-59.
 Wang Y H, Wang H Y, Guan A H, et al., Evolutionary design of random number generator, First IITA International Joint Conference on Artificial Intelligence, 2009, 256-259.
 Siegenthaler T, Decrypting a class of stream ciphers using ciphertext only, IEEE Transactions on Computers, 1985, 34(1):81-85.
 Golić J D, Cryptanalysis of alleged A5 stream cipher, International Conference on the Theory and Applications of Cryptographic Techniques, 1997, 239-255.
 Knudsen L R, Meier W, Preneel B, et al., Analysis methods for (alleged) RC4, International Conference on the Theory and Application of Cryptology and Information Security, 1998, 18-22.
 Hawkes P and Rose G G, Analysis methods for (alleged) RC4, Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers, 2000, 303-316.
 Ahmadi H and Eghlidos T, Heuristic guess-and-determine attacks on stream ciphers, IET Information Security, 2009, 3(2):66-73.
 Bouillaguet C, Derbez P, and Fouque P A, Automatic search of attacks on round-reduced AES and applications, CRYPTO 2011, 2011, 169-187.
 Huang Z Y and Lin D D, Attacking bivium and trivium with the characteristic set method, Africacrypt 2011, 2011, 77-91.
 Feng X T, Liu J, Zhou Z C, et al., A Byte-based guess and determine attack on SOSEMANUK, ASIACRYPT 2010, 2010, 146-157.
 Feng X T, Shi Z Q, Wu C K, et al., on guess and determine analysis of rabbit, International Journal of Foundations of Computer Science, 2011, 22(6):1283-1296.
 Shi Z Q, Feng X T, Feng D G, et al., A real-time key recovery attack on the lightweight stream cipher A2U2, International Conference on Cryptology and Network Security, 2012, 12-22.
 Feng X T and Zhang F, A realtime key recovery attack on the authenticated cipher FASER128,IACR Cryptology ePrint Archive, 2014, https://eprint.iacr.org/2014/258.
 Feng X T and Zhang F, Cryptanalysis on the authenticated cipher Sablier, International Conference on Network and System Security, 2015, 198-208.
 Feng X T, Zhang F, and Wang H, A practical forgery and state recovery attack on the authenticated cipher PANDA-s, IACR Cryptology ePrint Archive, 2014, https://eprint. iacr.org/2014/325.
 Jiao L, Li Y Q, and Hao Y L, A guess-and-determine attack on SNOW-V stream cipher, The Computer Journal, 2020, 63(12):1789-1812.
 Pavlenko A, Buzdalov M, and Ulyantsev V, Fitness comparison by statistical testing in construction of SAT-based guess-and-determine cryptographic attacks, GECCO 2019, 2019, 312-320.
 Cen Z, Feng X T, Wang Z Y, et al., Minimizing deduction system and its application, arxiv, 2020, https://arxiv.org/abs/2006.05833.
 Ekdahl P and Johansson T, A new version of the stream cipher SNOW, International Workshop on Selected Areas in Cryptography, 2002, 47-61.
 Watanabe D, Okamoto K, and Kaneko T, A hardware-oriented light weight pseudo-random number generator Enocoro-128v2, SCIS 2010, 2010, 3D1-3.
 Canniére H D, Trivium:A stream cipher construction inspired by block cipher design principles, International Conference on Information Security, 2006, 171-186.
 Canniére C D and Preneel B, New Stream Cipher Design, Springer, Berlin, Heidelberg, 2008.
 Eén N and Sörensson N, An extensible sat-solver, International Conference on Theory and Applications of Satisfiability Testing, Springer, 2003, 502-518.
 Clegg M, Edmonds J, Impagliazzo R, Using the Groebner basis algorithm to find proofs of unsatisfiability, Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, 1996, 174-183.
 Chai F J, Gao X S, and Yuan C M, A characteristic set method for solving boolean equations and applications in cryptanalysis of stream ciphers, Journal of Systems Science&Complexity, 2008, 21(2):191-208.
 International Standard Organization, ISO/IEC 180334:Information technology-Security techniques-Encryption algorithms-Part 4:Stream ciphers, 2011.
 International Standard Organization, ISO/IEC 291923:Information technology-Security techniques-Encryption algorithms-Part 3:Stream ciphers, 2012.
|||Xin Chao ZHAO. A GREEDY GENETIC ALGORITHM FOR UNCONSTRAINED GLOBAL OPTIMIZATION [J]. Journal of Systems Science and Complexity, 2005, 18(1): 102-110.|
|||S.Suganuma;V.N.Huynh;Y.Nakamori;S.Y.Wang;K.K.Lai. A FRAMEWORK OF FUZZY LANDSCAOE THEORY WITH AN APPLICATION TO ALLIANCE ANALYSIS [J]. Journal of Systems Science and Complexity, 2003, 16(1): 1-012.|