Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference7 articles.
1. On the application of the Borel-Cantelli Lemma;Chang;Trans. Amer. Math. Soc.,1952
2. Cryptography and computer privacy;Freitel;Scientific American,1973
3. The strict avalanche criterion: Spectral properties of booleans functions and an extended definition;Forré,1990
4. A structured design of substitution-permutation encryption networks;Kam;IEEE Trans. Comput.,1979
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Avalanche and Propagation Criteria;Cryptographic Boolean Functions and Applications;2017
2. Bibliography;Cryptographic Boolean Functions and Applications;2017
3. References;Cryptographic Boolean Functions and Applications;2009
4. Strict avalanche criterion over finite fields;Mathematical Cryptology;2007-01-01
5. An upper bound for the number of functions satisfying the strict avalanche criterion;DISCRET MATH APPL;2005