1. A review of security verification analysis of cryptographic protocol code execution[J];Zhang;Journal of Computer Science,2018
2. AES Encryption and Decryption Algorithm and Its Security Analysis;Wang;Network Security Technology and Applications,2022
3. The cryptographic function counting problem with inverse function affine equivalence over a finite fieldF_(p~n)[J];Yuan;Journal of Computer Science,2019
4. Differential-Linear Cryptanalysis Revisited
5. Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices