Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Казимиров, А В
Kazymyrov, O V
Казимирова, В Н
Kazymyrova, V N
Олейников, Р В
and
Oleynykov, R V
2014.
Метод генерации сильно нелинейных S-блоков на основе градиентного спуска.
Математические вопросы криптографии,
Vol. 5,
Issue. 2,
p.
71.
Bracken, Carl
and
Göloğlu, Faruk
2014.
A non-cyclic triple-error-correcting BCH-like code and some minimum distance results.
Designs, Codes and Cryptography,
Vol. 72,
Issue. 2,
p.
317.
Roy, Dibyendu
Datta, Pratish
and
Mukhopadhyay, Sourav
2014.
Recent Trends in Computer Networks and Distributed Systems Security.
Vol. 420,
Issue. ,
p.
211.
Picek, Stjepan
Ege, Baris
Papagiannopoulos, Kostas
Batina, Lejla
and
Jakobovic, Domagoj
2014.
Optimality and beyond: The case of 4×4 S-boxes.
p.
80.
Picek, Stjepan
Batina, Lejla
Jakobović, Domagoj
Ege, Barış
and
Golub, Marin
2014.
Information Security Theory and Practice. Securing the Internet of Things.
Vol. 8501,
Issue. ,
p.
140.
Hennawy, Hadia M. El
Omar, Alaa E.
and
Kholaif, Salah M.
2014.
Design of LEA: Link encryption algorithm new proposed stream cipher algorithm.
p.
82.
Datta, Pratish
Roy, Dibyendu
and
Mukhopadhyay, Sourav
2014.
Network and System Security.
Vol. 8792,
Issue. ,
p.
558.
LIU, Jian
CHEN, Lusheng
and
GUANG, Xuan
2014.
Highly Nonlinear Resilient Functions without Linear Structures.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E97.A,
Issue. 6,
p.
1405.
Picek, Stjepan
Papagiannopoulos, Kostas
Ege, Barış
Batina, Lejla
and
Jakobovic, Domagoj
2014.
Progress in Cryptology -- INDOCRYPT 2014.
Vol. 8885,
Issue. ,
p.
374.
Picek, Stjepan
Mazumdar, Bodhisatwa
Mukhopadhyay, Debdeep
and
Batina, Lejla
2015.
Security, Privacy, and Applied Cryptography Engineering.
Vol. 9354,
Issue. ,
p.
210.
De Cnudde, Thomas
Bilgin, Begül
Reparaz, Oscar
and
Nikova, Svetla
2015.
Cryptography and Information Security in the Balkans.
Vol. 9024,
Issue. ,
p.
75.
Roy, Dibyendu
Datta, Pratish
and
Mukhopadhyay, Sourav
2015.
Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function.
Journal of Applied Mathematics and Computing,
Vol. 49,
Issue. 1-2,
p.
397.
El Hennawy, Hadia M.S.
Omar, Alaa E.A.
and
Kholaif, Salah M.A.
2015.
LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm.
Ain Shams Engineering Journal,
Vol. 6,
Issue. 1,
p.
57.
Picek, Stjepan
Jakobovic, Domagoj
Miller, Julian F.
Marchiori, Elena
and
Batina, Lejla
2015.
Genetic Programming.
Vol. 9025,
Issue. ,
p.
192.
Sertkaya, İsa
Doğanaksoy, Ali
Uzunkol, Osmanbey
and
Kiraz, Mehmet Sabır
2015.
Arithmetic of Finite Fields.
Vol. 9061,
Issue. ,
p.
121.
Rodinko, Mariia
Oliynykov, Roman
and
Gorbenko, Yurii
2016.
Improvement of the high nonlinear S-boxes generation method.
p.
63.
Nguyen, Dang
Vo, Bay
and
Vu, Duc‐Lung
2016.
A Parallel Strategy for the Logical‐probabilistic Calculus‐based Method to Calculate Two‐terminal Reliability.
Quality and Reliability Engineering International,
Vol. 32,
Issue. 7,
p.
2313.
Mesnager, Sihem
Zhang, Fengrong
and
Zhou, Yong
2017.
On construction of bent functions involving symmetric functions and their duals.
Advances in Mathematics of Communications,
Vol. 11,
Issue. 2,
p.
347.
Raj, Sunny
Chakraborty, Dwaipayan
and
Jha, Sumit Kumar
2017.
In-memory flow-based stochastic computing on memristor crossbars using bit-vector stochastic streams.
p.
855.
Rossi, Giovanni
2017.
Pattern Recognition Applications and Methods.
Vol. 10163,
Issue. ,
p.
60.