Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Picek, Stjepan
Batina, Lejla
Jakobović, Domagoj
Ege, Barış
and
Golub, Marin
2014.
Information Security Theory and Practice. Securing the Internet of Things.
Vol. 8501,
Issue. ,
p.
140.
Picek, Stjepan
Ege, Baris
Papagiannopoulos, Kostas
Batina, Lejla
and
Jakobovic, Domagoj
2014.
Optimality and beyond: The case of 4×4 S-boxes.
p.
80.
Picek, Stjepan
Papagiannopoulos, Kostas
Ege, Barış
Batina, Lejla
and
Jakobovic, Domagoj
2014.
Progress in Cryptology -- INDOCRYPT 2014.
Vol. 8885,
Issue. ,
p.
374.
Казимиров, А В
Kazymyrov, O V
Казимирова, В Н
Kazymyrova, V N
Олейников, Р В
and
Oleynykov, R V
2014.
Метод генерации сильно нелинейных S-блоков на основе градиентного спуска.
Математические вопросы криптографии,
Vol. 5,
Issue. 2,
p.
71.
Datta, Pratish
Roy, Dibyendu
and
Mukhopadhyay, Sourav
2014.
Network and System Security.
Vol. 8792,
Issue. ,
p.
558.
Roy, Dibyendu
Datta, Pratish
and
Mukhopadhyay, Sourav
2014.
Recent Trends in Computer Networks and Distributed Systems Security.
Vol. 420,
Issue. ,
p.
211.
Bracken, Carl
and
Göloğlu, Faruk
2014.
A non-cyclic triple-error-correcting BCH-like code and some minimum distance results.
Designs, Codes and Cryptography,
Vol. 72,
Issue. 2,
p.
317.
Hennawy, Hadia M. El
Omar, Alaa E.
and
Kholaif, Salah M.
2014.
Design of LEA: Link encryption algorithm new proposed stream cipher algorithm.
p.
82.
LIU, Jian
CHEN, Lusheng
and
GUANG, Xuan
2014.
Highly Nonlinear Resilient Functions without Linear Structures.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E97.A,
Issue. 6,
p.
1405.
De Cnudde, Thomas
Bilgin, Begül
Reparaz, Oscar
and
Nikova, Svetla
2015.
Cryptography and Information Security in the Balkans.
Vol. 9024,
Issue. ,
p.
75.
Sertkaya, İsa
Doğanaksoy, Ali
Uzunkol, Osmanbey
and
Kiraz, Mehmet Sabır
2015.
Arithmetic of Finite Fields.
Vol. 9061,
Issue. ,
p.
121.
El Hennawy, Hadia M.S.
Omar, Alaa E.A.
and
Kholaif, Salah M.A.
2015.
LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm.
Ain Shams Engineering Journal,
Vol. 6,
Issue. 1,
p.
57.
Roy, Dibyendu
Datta, Pratish
and
Mukhopadhyay, Sourav
2015.
Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function.
Journal of Applied Mathematics and Computing,
Vol. 49,
Issue. 1-2,
p.
397.
Picek, Stjepan
Mazumdar, Bodhisatwa
Mukhopadhyay, Debdeep
and
Batina, Lejla
2015.
Security, Privacy, and Applied Cryptography Engineering.
Vol. 9354,
Issue. ,
p.
210.
Picek, Stjepan
Jakobovic, Domagoj
Miller, Julian F.
Marchiori, Elena
and
Batina, Lejla
2015.
Genetic Programming.
Vol. 9025,
Issue. ,
p.
192.
Nguyen, Dang
Vo, Bay
and
Vu, Duc‐Lung
2016.
A Parallel Strategy for the Logical‐probabilistic Calculus‐based Method to Calculate Two‐terminal Reliability.
Quality and Reliability Engineering International,
Vol. 32,
Issue. 7,
p.
2313.
Rodinko, Mariia
Oliynykov, Roman
and
Gorbenko, Yurii
2016.
Improvement of the high nonlinear S-boxes generation method.
p.
63.
Dung, Luong The
and
Tho, Hoang Duc
2017.
An Algorithm for Improving Algebraic Degree of S-Box Based on Affine Equivalence Transformation.
International Journal of Knowledge and Systems Science,
Vol. 8,
Issue. 1,
p.
53.
Mesnager, Sihem
and
Cohen, Gérard
2017.
Fast algebraic immunity of Boolean functions.
Advances in Mathematics of Communications,
Vol. 11,
Issue. 2,
p.
373.
Raj, Sunny
Chakraborty, Dwaipayan
and
Jha, Sumit Kumar
2017.
In-memory flow-based stochastic computing on memristor crossbars using bit-vector stochastic streams.
p.
855.