-
1
-
-
84858666096
-
Boolean functions satisfying a higher order strict avalanche criterion
-
T. Helleseth, ed., Advances in Cryptology - Eurocrypt '93, Springer, Berlin
-
T.W. Cusick, Boolean functions satisfying a higher order strict avalanche criterion, in: T. Helleseth, ed., Advances in Cryptology - Eurocrypt '93, Lecture Notes in Computer Science 765 (Springer, Berlin, 1994) 102-117.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 102-117
-
-
Cusick, T.W.1
-
2
-
-
0001820140
-
Cryptography and computer privacy
-
H. Feistel, Cryptography and computer privacy, Scientific American 228 (1973) 15-23.
-
(1973)
Scientific American
, vol.228
, pp. 15-23
-
-
Feistel, H.1
-
3
-
-
85011285633
-
The strict avalanche criterion: Spectral properties of Boolean functions and an extended definition
-
S. Goldwasser, ed., Advances in Cryptology - Crypto '88, Springer, Berlin
-
R. Forré, The strict avalanche criterion: spectral properties of Boolean functions and an extended definition, in: S. Goldwasser, ed., Advances in Cryptology - Crypto '88, Lecture Notes in Computer Science 403 (Springer, Berlin, 1990) 450-468.
-
(1990)
Lecture Notes in Computer Science
, vol.403
, pp. 450-468
-
-
Forré, R.1
-
4
-
-
0018530910
-
A structured design of substitution-permutation encryption networks
-
J.B. Kam and G.I. Davida, A structured design of substitution-permutation encryption networks, IEEE Trans. Comput. 28 (1979) 747-753.
-
(1979)
IEEE Trans. Comput.
, vol.28
, pp. 747-753
-
-
Kam, J.B.1
Davida, G.I.2
-
5
-
-
0041532142
-
Counting functions satisfying a higher order strict avalanche criterion
-
J.-J. Quisquater and J. Vandewalle, eds., Advances in Cryptology - Eurocrypt '89, Springer, Berlin
-
S. Lloyd, Counting functions satisfying a higher order strict avalanche criterion, in: J.-J. Quisquater and J. Vandewalle, eds., Advances in Cryptology - Eurocrypt '89, Lecture Notes in Computer Science 434 (Springer, Berlin, 1990) 63-74.
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 63-74
-
-
Lloyd, S.1
-
6
-
-
0041532131
-
Characterising and counting functions satisfying the strict avalanche criterion of order (n - 3)
-
C. Mitchell, ed., Clarendon Press, Oxford
-
S. Lloyd, Characterising and counting functions satisfying the strict avalanche criterion of order (n - 3), in: C. Mitchell, ed., Cryptography and Coding II (Clarendon Press, Oxford, 1992) 165-172.
-
(1992)
Cryptography and Coding
, vol.2
, pp. 165-172
-
-
Lloyd, S.1
-
7
-
-
0026630858
-
Counting binary functions with certain cryptographic properties
-
S. Lloyd, Counting binary functions with certain cryptographic properties, J. Cryptology 5 (1992) 107-131.
-
(1992)
J. Cryptology
, vol.5
, pp. 107-131
-
-
Lloyd, S.1
-
8
-
-
0028699983
-
An upper bound on the number of functions satisfying the strict avalanche criterion
-
L. O'Connor, An upper bound on the number of functions satisfying the Strict Avalanche Criterion, Inform. Process. Lett. 52 (1994) 325-327.
-
(1994)
Inform. Process. Lett.
, vol.52
, pp. 325-327
-
-
O'Connor, L.1
-
9
-
-
84955621100
-
Propagation characteristics of boolean functions
-
I.B. Damgard, ed., Advances in Cryptology - Eurocrypt '90, Springer, Berlin
-
B. Preneel, W. Van Leekwijck, L. Van Linden, R. Govaerts and J. Vandewalle, Propagation characteristics of Boolean functions, in: I.B. Damgard, ed., Advances in Cryptology - Eurocrypt '90, Lecture Notes in Computer Science 473 (Springer, Berlin, 1991) 161-173.
-
(1991)
Lecture Notes in Computer Science
, vol.473
, pp. 161-173
-
-
Preneel, B.1
Van Leekwijck, W.2
Van Linden, L.3
Govaerts, R.4
Vandewalle, J.5
-
10
-
-
85020573990
-
On the design of s-boxes
-
H.C. Williams, ed., Advances in Cryptology - Crypto '85, Springer, Berlin
-
A.F. Webster and S.E. Tavares, On the design of S-boxes, in: H.C. Williams, ed., Advances in Cryptology - Crypto '85, Lecture Notes in Computer Science 218 (Springer, Berlin, 1986) 523-534.
-
(1986)
Lecture Notes in Computer Science
, vol.218
, pp. 523-534
-
-
Webster, A.F.1
Tavares, S.E.2
|