Author:
TURAN Esin,ÖZDEMİR Mustafa Kemal,KARAKAYA Barış,ÖZKAYNAK Fatih
Reference48 articles.
1. [1]. V. Dudykevych, O. Bakay, Y. Lakh, Investigation of Payment Cards systems information security control, 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2013, 651-654
2. [2]. V Dudykevych, I Garasym, Survivable security Systems Analysis, 2010, Computer science and information technologies: Materials of the VIth International scientific and technical conference CSIT, 108-110
3. [3]. Z. M. Z. Muhammad and F. Özkaynak, "Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique," in IEEE Access, vol. 7, pp. 99945-99953, 2019, doi: 10.1109/ACCESS.2019.2930606.
4. [4]. T. Cusick and P. Stanica, Cryptographic Boolean Functions and Applica- tions. Amsterdam, The Netherlands: Elsevier, 2009.
5. [5]. C. Wu and D. Feng, Boolean Functions and Their Applications in Cryp- tography. Berlin, Germany: Springer, 2016.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献