Systematic generation of cryptographically robust S-boxes
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
New types of cryptanalytic attacks using related keys
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Payment systems for hypermedia information systems
ACM SIGSAC Review - Soecial issues on Issues 95: electronic commerce
On Weaknesses of Non–surjective Round Functions
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Constructing Symmetric Ciphers Using the CAST Design Procedure
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Relating Differential Distribution Tables to Other Propertiesof of Substitution Boxes
Designs, Codes and Cryptography
How to decrypt or even substitute DES-Encrypted messages in 228 steps
Information Processing Letters
Avalanche Characteristics of Substitution-Permutation Encryption Networks
IEEE Transactions on Computers
SAC '98 Proceedings of the Selected Areas in Cryptography
Differtial Cryptanalysis of Lucifer
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Pitfalls in Designing Substitution Boxes (Extended Abstract)
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Differential Cryptanalysis of the ICE Encryption Algorithm
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Automated design of a lightweight block cipher with Genetic Programming
International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Tool
Non-linear approximations in linear cryptanalysis
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Differential cryptanalysis mod 232 with applications to MD5
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Non-linear cryptanalysis revisited: heuristic search for approximations to S-boxes
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Crypto topics and applications II
Algorithms and theory of computation handbook
Hi-index | 0.00 |