Author:
Castro Julio César Hernández,Viñuela Pedro Isasi
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference39 articles.
1. Bagnall, A.J., Mc Keown, G.P. and Rayward-Smith, V.J., “The Cryptanalysis of a Three Rotor Machine Using a Genetic Algorithm,” inProc. of the 7th International Conference on Genetics Algorithms ICGA’97, Morgan-Kaufmann, 1997.
2. Cain, T.R. and Sherman, A.T., “How to Break Gifford’s Cipher,” inProc. of the ACM Conference on Computer and Communications Security, pp. 198–209, 1994.
3. Carroll, J.M. and Martin, S., “The Automated Cryptanalysis of Substitution Ciphers,”Cryptologia, X, 4, pp. 193–209, 1986.
4. Carroll, J.M. and Robbins, L., “The Automated Cryptanalysis of Polyalphabetic Ciphers,”Cryptologia, XI, 4, pp. 193–205, 1987.
5. Clark, J.A. and Jacob, J.L., “Fault Injection and a Timing Channel on an Analysis Technique,” inProc. of Eurocrypt, pp. 181–197, 2002.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献