Author:
O'Connor Luke,Klapper Andrew
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference31 articles.
1. C. Adams and S. Tavares. The structured design of cryptographically good S-boxes. Journal of Cryptology, 3(1):27–41, 1990.
2. M. Beale and M. F. Monaghan. Encryption using random boolean functions. In Cryptography and Coding (H. J. Beker and F. C. Piper, eds.), pp. 219–230. Clarendon Press, Oxford, 1989.
3. E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3–72, 1991.
4. Lecture Notes in Computer Science;D. Chaum,1986
5. Lecture Notes in Computer Science;J. H. Evertse,1988
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Improved BV-based quantum attack on block ciphers;Quantum Information Processing;2022-12-08
2. SAILFISH-I: A Lightweight Block Cipher for Cloud-Enabled Fog Devices;2022 IEEE 6th Conference on Information and Communication Technology (CICT);2022-11-18
3. A quantum related-key attack based on the Bernstein–Vazirani algorithm;Quantum Information Processing;2020-07-14
4. Avalanche and Propagation Criteria;Cryptographic Boolean Functions and Applications;2017
5. Bibliography;Cryptographic Boolean Functions and Applications;2017