Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference24 articles.
1. Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
2. Beth, T., Ding, C.: On almost perfect nonlinear permutations, Advances in cryptology-EUROCRYPT’93, Lecture Notes in Computer science, vol. 765, pp 65–76. Springer, New York (1993)
3. Brinkmann, M., Leander, G.: On the classification of APN functions up to dimension five. Des. Codes Cryptogr. 49.1-3, 273–288 (2008)
4. Browning, K. A., Dillon, J. F., McQuistan, M. T., Wolfe, A. J.: An APN permutation in dimension six. Finite Fields: Theory Appl. 518, 33–42 (2010)
5. Budaghyan, L.: The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp 177–188. Springer, Heidelberg (2007)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献