Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Казимиров, А В
Kazymyrov, O V
Казимирова, В Н
Kazymyrova, V N
Олейников, Р В
and
Oleynykov, R V
2014.
Метод генерации сильно нелинейных S-блоков на основе градиентного спуска.
Математические вопросы криптографии,
Vol. 5,
Issue. 2,
p.
71.
LIU, Jian
CHEN, Lusheng
and
GUANG, Xuan
2014.
Highly Nonlinear Resilient Functions without Linear Structures.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E97.A,
Issue. 6,
p.
1405.
Picek, Stjepan
Ege, Baris
Papagiannopoulos, Kostas
Batina, Lejla
and
Jakobovic, Domagoj
2014.
Optimality and beyond: The case of 4×4 S-boxes.
p.
80.
Bracken, Carl
and
Göloğlu, Faruk
2014.
A non-cyclic triple-error-correcting BCH-like code and some minimum distance results.
Designs, Codes and Cryptography,
Vol. 72,
Issue. 2,
p.
317.
Roy, Dibyendu
Datta, Pratish
and
Mukhopadhyay, Sourav
2014.
Recent Trends in Computer Networks and Distributed Systems Security.
Vol. 420,
Issue. ,
p.
211.
Datta, Pratish
Roy, Dibyendu
and
Mukhopadhyay, Sourav
2014.
Network and System Security.
Vol. 8792,
Issue. ,
p.
558.
Hennawy, Hadia M. El
Omar, Alaa E.
and
Kholaif, Salah M.
2014.
Design of LEA: Link encryption algorithm new proposed stream cipher algorithm.
p.
82.
Picek, Stjepan
Batina, Lejla
Jakobović, Domagoj
Ege, Barış
and
Golub, Marin
2014.
Information Security Theory and Practice. Securing the Internet of Things.
Vol. 8501,
Issue. ,
p.
140.
Picek, Stjepan
Papagiannopoulos, Kostas
Ege, Barış
Batina, Lejla
and
Jakobovic, Domagoj
2014.
Progress in Cryptology -- INDOCRYPT 2014.
Vol. 8885,
Issue. ,
p.
374.
El Hennawy, Hadia M.S.
Omar, Alaa E.A.
and
Kholaif, Salah M.A.
2015.
LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm.
Ain Shams Engineering Journal,
Vol. 6,
Issue. 1,
p.
57.
Picek, Stjepan
Mazumdar, Bodhisatwa
Mukhopadhyay, Debdeep
and
Batina, Lejla
2015.
Security, Privacy, and Applied Cryptography Engineering.
Vol. 9354,
Issue. ,
p.
210.
De Cnudde, Thomas
Bilgin, Begül
Reparaz, Oscar
and
Nikova, Svetla
2015.
Cryptography and Information Security in the Balkans.
Vol. 9024,
Issue. ,
p.
75.
Picek, Stjepan
Jakobovic, Domagoj
Miller, Julian F.
Marchiori, Elena
and
Batina, Lejla
2015.
Genetic Programming.
Vol. 9025,
Issue. ,
p.
192.
Roy, Dibyendu
Datta, Pratish
and
Mukhopadhyay, Sourav
2015.
Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function.
Journal of Applied Mathematics and Computing,
Vol. 49,
Issue. 1-2,
p.
397.
Sertkaya, İsa
Doğanaksoy, Ali
Uzunkol, Osmanbey
and
Kiraz, Mehmet Sabır
2015.
Arithmetic of Finite Fields.
Vol. 9061,
Issue. ,
p.
121.
Rodinko, Mariia
Oliynykov, Roman
and
Gorbenko, Yurii
2016.
Improvement of the high nonlinear S-boxes generation method.
p.
63.
Nguyen, Dang
Vo, Bay
and
Vu, Duc‐Lung
2016.
A Parallel Strategy for the Logical‐probabilistic Calculus‐based Method to Calculate Two‐terminal Reliability.
Quality and Reliability Engineering International,
Vol. 32,
Issue. 7,
p.
2313.
Mesnager, Sihem
and
Cohen, Gérard
2017.
Fast algebraic immunity of Boolean functions.
Advances in Mathematics of Communications,
Vol. 11,
Issue. 2,
p.
373.
Mesnager, Sihem
and
Zhang, Fengrong
2017.
On constructions of bent, semi-bent and five valued spectrum functions from old bent functions.
Advances in Mathematics of Communications,
Vol. 11,
Issue. 2,
p.
339.
Dung, Luong The
and
Tho, Hoang Duc
2017.
An Algorithm for Improving Algebraic Degree of S-Box Based on Affine Equivalence Transformation.
International Journal of Knowledge and Systems Science,
Vol. 8,
Issue. 1,
p.
53.