Systematic generation of cryptographically robust S-boxes
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Information leakage of boolean functions and its relationship to other cryptographic criteria
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Constructing Symmetric Ciphers Using the CAST Design Procedure
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Relating Differential Distribution Tables to Other Propertiesof of Substitution Boxes
Designs, Codes and Cryptography
On the Design of SP Networks From an Information Theoretic Point of View
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Differtial Cryptanalysis of Lucifer
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Pitfalls in Designing Substitution Boxes (Extended Abstract)
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Design and evaluation of a block encryption algorithm using dynamic-key mechanism
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
New cryptographic applications of boolean function equivalence classes
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Hi-index | 0.89 |