Applications of Soft Computing in Cryptology

被引:0
作者
Picek, Stjepan [1 ,2 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC & iMinds, Bus 2452,Kasteelpk Arenberg 10, B-3001 Leuven Heverlee, Belgium
[2] Univ Paris 08, CNRS, UMR 7539, LAGA, St Denis, France
来源
INFORMATION SECURITY APPLICATIONS, WISA 2016 | 2017年 / 10144卷
关键词
Soft computing; Machine learning; Evolutionary computation; Cryptology; Side-channel attacks; PUFs; MACHINE; ATTACKS;
D O I
10.1007/978-3-319-56549-1_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Soft computing offers a number of interesting options how to solve many real world problems where security and cryptology domains are not exceptions. There, machine learning and various optimization techniques can play a significant role in finding new, improved solutions. Sometimes those methods are used to solve the problem itself, while sometimes they just represent a helper tool in a larger task. A more in-depth understanding of such techniques is always beneficial. Moreover, the research topics belonging to the intersection of the soft computing and the cryptology are rather demanding since usually neither of those two communities devotes much attention to the other area. In this paper, we briefly discuss three well-known applications of soft computing to the cryptology area where we identify main challenges and offer some possible future research directions.
引用
收藏
页码:305 / 317
页数:13
相关论文
共 44 条
  • [1] [Anonymous], 2009, TELECOM PARISTECH SE
  • [2] [Anonymous], P HASP 13 2 INT WORK
  • [3] The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs
    Becker, Georg T.
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 535 - 555
  • [4] Genetic programming for feature construction and selection in classification on high-dimensional data
    Binh Tran
    Xue, Bing
    Zhang, Mengjie
    [J]. MEMETIC COMPUTING, 2016, 8 (01) : 3 - 15
  • [5] Bishop C.M., 2006, PATTERN RECOGN, V4, P738, DOI DOI 10.1117/1.2819119
  • [6] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [7] Carlet C., 2010, BOOLEAN MODELS METHO, P398
  • [8] Carlet C., 2010, Boolean Models and Methods in Mathematics, Computer Science, and Engineering, P257, DOI [10.1017/CBO9780511780448.011, DOI 10.1017/CBO9780511780448.011]
  • [9] Carlet C, 2014, RADON SER COMPUT APP, V16, P41
  • [10] Carlet Claude, 2012, INT C CRYPTOLOGY IND, P120