Random sequence generation by cellular automata
Advances in Applied Mathematics
How to break Gifford's cipher (extended abstract)
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Breaking substitution ciphers using a relaxation algorithm
Communications of the ACM
Genetic Cryptoanalysis of Two Rounds TEA
ICCS '02 Proceedings of the International Conference on Computational Science-Part III
Co-evolving Parallel Random Number Generators
PPSN IV Proceedings of the 4th International Conference on Parallel Problem Solving from Nature
An effective genetic algorithm for finding highly nonlinear Boolean Functions
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Cryptography with Cellular Automata
CRYPTO '85 Advances in Cryptology
The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Fault Injection and a Timing Channel on an Analysis Technique
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
A new identification scheme based on the perceptrons problem
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
IEEE Transactions on Evolutionary Computation
Hi-index | 0.00 |