Author:
Hematpour Nafiseh,Ahadpour Sodeif
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference73 articles.
1. Webster AF, Tavares SE (1985) On the design of s-boxes. In: Conference on the theory and application of cryptographic techniques, pp 523–534
2. Hussain I, Shah T, Gondal MA, Khan WA, Mahmood H (2013) A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput Appl 23(1):97–104
3. National Institute of Standards and Technology, FIPS PUB 46-3: Data Encryption Standard (DES), (Oct. 1999), super-sedes FIPS, 46-2
4. Advanced Encryption Standard (AES), (2001) Federal Information Processing Standards Publication 197 Std
5. Picek S, Batina L, Jakobović D, Ege B, Golub M (2014) S-box, SET, match: a toolbox for S-box analysis. In: Naccache D, Sauveron D (eds) Information security theory and practice. Securing the internet of things, vol 8501. Springer, Berlin, pp 140–149
Cited by
49 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献