Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
LIU, Jian
CHEN, Lusheng
and
GUANG, Xuan
2014.
Highly Nonlinear Resilient Functions without Linear Structures.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E97.A,
Issue. 6,
p.
1405.
Picek, Stjepan
Ege, Baris
Papagiannopoulos, Kostas
Batina, Lejla
and
Jakobovic, Domagoj
2014.
Optimality and beyond: The case of 4×4 S-boxes.
p.
80.
Hennawy, Hadia M. El
Omar, Alaa E.
and
Kholaif, Salah M.
2014.
Design of LEA: Link encryption algorithm new proposed stream cipher algorithm.
p.
82.
Roy, Dibyendu
Datta, Pratish
and
Mukhopadhyay, Sourav
2014.
Recent Trends in Computer Networks and Distributed Systems Security.
Vol. 420,
Issue. ,
p.
211.
Казимиров, А В
Kazymyrov, O V
Казимирова, В Н
Kazymyrova, V N
Олейников, Р В
and
Oleynykov, R V
2014.
Метод генерации сильно нелинейных S-блоков на основе градиентного спуска.
Математические вопросы криптографии,
Vol. 5,
Issue. 2,
p.
71.
Picek, Stjepan
Batina, Lejla
Jakobović, Domagoj
Ege, Barış
and
Golub, Marin
2014.
Information Security Theory and Practice. Securing the Internet of Things.
Vol. 8501,
Issue. ,
p.
140.
Bracken, Carl
and
Göloğlu, Faruk
2014.
A non-cyclic triple-error-correcting BCH-like code and some minimum distance results.
Designs, Codes and Cryptography,
Vol. 72,
Issue. 2,
p.
317.
Datta, Pratish
Roy, Dibyendu
and
Mukhopadhyay, Sourav
2014.
Network and System Security.
Vol. 8792,
Issue. ,
p.
558.
Picek, Stjepan
Papagiannopoulos, Kostas
Ege, Barış
Batina, Lejla
and
Jakobovic, Domagoj
2014.
Progress in Cryptology -- INDOCRYPT 2014.
Vol. 8885,
Issue. ,
p.
374.
Roy, Dibyendu
Datta, Pratish
and
Mukhopadhyay, Sourav
2015.
Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function.
Journal of Applied Mathematics and Computing,
Vol. 49,
Issue. 1-2,
p.
397.
Picek, Stjepan
Jakobovic, Domagoj
Miller, Julian F.
Marchiori, Elena
and
Batina, Lejla
2015.
Genetic Programming.
Vol. 9025,
Issue. ,
p.
192.
De Cnudde, Thomas
Bilgin, Begül
Reparaz, Oscar
and
Nikova, Svetla
2015.
Cryptography and Information Security in the Balkans.
Vol. 9024,
Issue. ,
p.
75.
Picek, Stjepan
Mazumdar, Bodhisatwa
Mukhopadhyay, Debdeep
and
Batina, Lejla
2015.
Security, Privacy, and Applied Cryptography Engineering.
Vol. 9354,
Issue. ,
p.
210.
El Hennawy, Hadia M.S.
Omar, Alaa E.A.
and
Kholaif, Salah M.A.
2015.
LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm.
Ain Shams Engineering Journal,
Vol. 6,
Issue. 1,
p.
57.
Sertkaya, İsa
Doğanaksoy, Ali
Uzunkol, Osmanbey
and
Kiraz, Mehmet Sabır
2015.
Arithmetic of Finite Fields.
Vol. 9061,
Issue. ,
p.
121.
Nguyen, Dang
Vo, Bay
and
Vu, Duc‐Lung
2016.
A Parallel Strategy for the Logical‐probabilistic Calculus‐based Method to Calculate Two‐terminal Reliability.
Quality and Reliability Engineering International,
Vol. 32,
Issue. 7,
p.
2313.
Rodinko, Mariia
Oliynykov, Roman
and
Gorbenko, Yurii
2016.
Improvement of the high nonlinear S-boxes generation method.
p.
63.
Mesnager, Sihem
Zhang, Fengrong
and
Zhou, Yong
2017.
On construction of bent functions involving symmetric functions and their duals.
Advances in Mathematics of Communications,
Vol. 11,
Issue. 2,
p.
347.
Mesnager, Sihem
and
Cohen, Gérard
2017.
Fast algebraic immunity of Boolean functions.
Advances in Mathematics of Communications,
Vol. 11,
Issue. 2,
p.
373.
Mesnager, Sihem
and
Zhang, Fengrong
2017.
On constructions of bent, semi-bent and five valued spectrum functions from old bent functions.
Advances in Mathematics of Communications,
Vol. 11,
Issue. 2,
p.
339.