Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Management Information Systems,Software
Reference45 articles.
1. Stallings W (2004) Network security essentials (applications and standards). Pearson Education, London, pp 2–80
2. Pfleeger CP, Pfleeger SL (2004) Security in computing. Pearson Education, London, pp 642–666
3. Trinca D (2006) Sequential and parallel cascaded convolution encryption with local propagation: toward future directions in cryptography. In: Proceedings of the 3rd international conference on information technology-new generations. (ITNG’06), 0-7695-2497- 4/. IEEE Computer Society
4. Hernández JC, Isasi P, Ribagorda A (2002) An application of genetic algorithms to the cryptoanalysis of one round TEA. In: Proceedings of the symposium on artificial intelligence and its application
5. Hernández JC, Sierra JM, Isasi P, Ribargorda A (2003) Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA. In Proceedings of the congress on evolutionary computation
Cited by
71 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献