Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Constructions of bent functions and difference sets
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Designs, Codes and Cryptography
Differentially uniform mappings for cryptography
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Constructions of Cheating Immune Secret Sharing
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Provable Security Against Differential Cryptanalysis
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Pitfalls in Designing Substitution Boxes (Extended Abstract)
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Generating cryptographically suitable non-linear maximum length cellular automata
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Designs, Codes and Cryptography
On known and new differentially uniform functions
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
On highly nonlinear s-boxes and their inability to thwart DPA attacks
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
A new criterion for nonlinearity of block ciphers
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
A new construction of highly nonlinear S-boxes
Cryptography and Communications
An evolutionary algorithm to improve the nonlinearity of self-inverse s-boxes
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Finite Fields and Their Applications
Generalized correlation analysis of Vectorial Boolean functions
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
"Provable" security against differential and linear cryptanalysis
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
On the relationships between perfect nonlinear functions and universal hash families
Theoretical Computer Science
Asymptotic nonlinearity of vectorial Boolean functions
Cryptography and Communications
Hi-index | 0.00 |