Author:
Koo Bon Wook,Jang Hwan Seok,Song Jung Hwan
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Shannon, C.E.: Communication theory of secrecy systems. Bell Systems Technical Journal 28, 656–715 (1949)
2. Heys, H.M., Tavares, S.E.: Avalanche characteristics of substitution-permutation encryption networks. IEEE Trans. Comp. 44, 1131–1139 (1995)
3. Litsyn, S., Rains, E.M., Sloane, N.J.A.: Available at http://www.math.unl.edu/djaffe/codes/webcodes/codeform.html
4. Lecture Notes in Computer Science;M. Kanda,1999
5. Kanda, M.: Practical Security Evaluation against Differential and Linear Cryptanalysis for Feistel Ciphers with SPN Round Function. In: Selected Areas in Cryptography 2000, pp. 324–338 (2000)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献