The strict avalanche criterion: spectral properties of boolean functions and an extended definition
CRYPTO '88 Proceedings on Advances in cryptology
Properties of binary functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Propagation characteristics of Boolean functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
Systematic generation of cryptographically robust S-boxes
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Boolean functions satisfying a higher order strict avalanche criterion
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Information leakage of boolean functions and its relationship to other cryptographic criteria
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Automated statistical methods for measuring the strength of block ciphers
Statistics and Computing
Highly nonlinear balanced boolean functions with good local and global avalanche characteristics
Information Processing Letters
The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks
MMNS '01 Proceedings of the 4th IFIP/IEEE International Conference on Management of Multimedia Networks and Services: Management of Multimedia on the Internet
On the Symmetric Property of Homogeneous Boolean Functions
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Cheating Immune Secret Sharing
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Constructions of Cheating Immune Secret Sharing
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
On Welch-Gong Transformation Sequence Generators
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
On Propagation Characteristics of Resilient Functions
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
On Some Cryptographic Properties of Rijndael
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
On the Design of SP Networks From an Information Theoretic Point of View
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Connections among nonlinearity, avalanche and correlation immunity
Theoretical Computer Science - Algorithms,automata, complexity and games
Boolean Functions with Five Controllable Cryptographic Properties
Designs, Codes and Cryptography
k-th order symmetric SAC boolean functions and bisecting binomial coefficients
Discrete Applied Mathematics - Special issue: Boolean and pseudo-boolean funtions
Exploring confusion in product ciphers through regression analysis
Information Sciences: an International Journal
Fast S-box security mechanism research based on the polymorphic cipher
Information Sciences: an International Journal
Authenticating ad hoc networks by comparison of short digests
Information and Computation
Searching for resource-efficient programs: low-power pseudorandom number generators
Proceedings of the 10th annual conference on Genetic and evolutionary computation
On Modeling Post Decryption Error Processes in UMTS Air Interface
Information Security and Cryptology
The Analysis of Windows Vista Disk Encryption Algorithm
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Cellular Automata-Based S-Boxes vs. DES S-Boxes
PaCT '09 Proceedings of the 10th International Conference on Parallel Computing Technologies
Finding Collisions for a 45-Step Simplified HAS-V
Information Security Applications
k-th order symmetric SAC boolean functions and bisecting binomial coefficients
Discrete Applied Mathematics - Special issue: Boolean and pseudo-boolean funtions
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Design of SAC/PC(l) of order k boolean functions and three other cryptographic criteria
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A construction for one way hash functions and pseudorandom bit generators
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Propagation characteristics and correlation-immunity of highly nonlinear boolean functions
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
Properties of safe cellular automata-based S-boxes
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part II
AONT-RS: blending security and performance in dispersed storage systems
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
Improving quality of DES S-boxes by cellular automata-based S-boxes
The Journal of Supercomputing
Generalized avalanche test for stream cipher analysis
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
On cross-correlation indicators of an S-box
Frontiers of Computer Science in China
A hardware implementation of lightweight block cipher for ubiquitous computing security
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
New cryptographic applications of boolean function equivalence classes
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
On application of neural networks for s-boxes design
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
Complexity-theoretical approaches to the design and analysis of cryptographical boolean functions
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
SETA'04 Proceedings of the Third international conference on Sequences and Their Applications
An evolutionary algorithm to improve the nonlinearity of self-inverse s-boxes
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Improved rijndael-like s-box and its transform domain analysis
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Partially perfect nonlinear functions and a construction of cryptographic boolean functions
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Fine-Grained timing using genetic programming
EuroGP'10 Proceedings of the 13th European conference on Genetic Programming
Dynamic cellular automata-based s-boxes
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part I
Propagation characteristics of x→ x-1 and Kloosterman sums
Finite Fields and Their Applications
"Provable" security against differential and linear cryptanalysis
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Designs, Codes and Cryptography
S-box construction from non-permutation power functions
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |