Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference55 articles.
1. Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications;Ahmad;IEEE Access,2020
2. Álvarez-Cubero, J. (2015). Vector Boolean Functions: Applications in symmetric cryptography. https://doi.org/10.13140/RG.2.2.12540.23685.
3. Ars, G., & Faugère, J.-C. (2005). Algebraic Immunities of functions over finite fields (Research Report RR-5532; p. 17). INRIA. https://hal.inria.fr/inria-00070475.
4. Banzhaf, W., & Hu, T. (2019). Evolutionary Computation. In W. Banzhaf & T. Hu, Evolutionary Biology. Oxford University Press. https://doi.org/10.1093/obo/9780199941728-0122.
5. Algebraic Cryptanalysis;Bard;Springer, US.,2009
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献