-
1
-
-
0002555945
-
Differential cryptanalysis of DES-like Cryptosys- tems (Extended Abstract)
-
Menezes, A.J. and Vanstone, S.A. eds., Springer-Verlag, Berlin
-
Biham, E. and Shamir, A., "Differential Cryptanalysis of DES-like Cryptosys- tems (Extended Abstract)," in Advances in Cryptology - Crypto '90 (Menezes, A.J. and Vanstone, S.A. eds.), LNCS, 537, pp. 2-21, Springer-Verlag, Berlin, 1990.
-
(1990)
Advances in Cryptology - Crypto '90
, vol.537
, pp. 2-2
-
-
Biham, E.1
Shamir, A.2
-
2
-
-
84958973763
-
Two stage optimisation in the design of boolean functions
-
Dawson, E., Clark, A. and Boyd, C. eds., Springer Verlag, July 2000
-
Clark, J.A. and Jacob, J.L., "Two Stage Optimisation in the Design of Boolean Functions," in 5th Australasian Conference on Information Security and Privacy (Dawson, E., Clark, A. and Boyd, C. eds.), ACISP 2000, LNCS, 1841, pp. 242-254. Springer Verlag, July 2000.
-
(2000)
5th Australasian Conference on Information Security and Privacy
, vol.1841
, pp. 242-254
-
-
Clark, J.A.1
Jacob, J.L.2
-
3
-
-
4344630715
-
Almost boolean functions: The design of boolean functions by spectral inversion
-
August
-
Clark, J.A., Jacob, J.L., Maitra, S. and Stánicá, P., "Almost Boolean functions: the Design of Boolean Functions by Spectral Inversion," Computational Intelligence, 20, 3, pp. 450-462, August 2004.
-
(2004)
Computational Intelligence
, vol.20
, Issue.3
, pp. 450-462
-
-
Clark, J.A.1
Jacob, J.L.2
Maitra, S.3
Stánicá, P.4
-
4
-
-
4344581166
-
Searching for cost functions
-
July
-
Clark, J.A., Jacob, J.L. and Stepney, S., "Searching for Cost Functions," in Conference on Evolutionary Computation - CEC-04, July 2004.
-
(2004)
Conference on Evolutionary Computation - CEC-04
-
-
Clark, J.A.1
Jacob, J.L.2
Stepney, S.3
-
5
-
-
84974720866
-
Evolving boolean functions satisfying multiple criteria
-
Springer Verlag
-
Clark, J.A., Jacob, J.L., Stepney, S., Maitra, S. and Millan, W., "Evolving Boolean Functions Satisfying Multiple Criteria," in Progress in Cryptology - IN- DOCRYPT 2002, LNCS, 2551, pp. 246-259, Springer Verlag, 2002.
-
(2002)
Progress in Cryptology - IN- DOCRYPT 2002, LNCS
, vol.2551
, pp. 246-259
-
-
Clark, J.A.1
Jacob, J.L.2
Stepney, S.3
Maitra, S.4
Millan, W.5
-
6
-
-
4344693030
-
A tutorial on linear and differential cryptanalysis
-
University of Newfoundland, St. John's, Newfoundland, Canada
-
Heys, H.M., "A Tutorial on Linear and Differential Cryptanalysis," Technical report, Electrical and Computer Engineering, University of Newfoundland, St. John's, Newfoundland, Canada, 2004.
-
(2004)
Technical Report, Electrical and Computer Engineering
-
-
Heys, H.M.1
-
7
-
-
26444479778
-
Optimization by simulated annealing
-
May
-
Kirkpatrick, S., Gelatt, Jr. CD. and Vecchi, M.P., "Optimization by Simulated Annealing," Science, 220, 4598, pp. 671-680, May 1983.
-
(1983)
Science
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt Jr., C.D.2
Vecchi, M.P.3
-
8
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Helleseth, T. ed, LNCS, Springer- Verlag, Berlin
-
Matsui, M., "Linear Cryptanalysis Method for DES Cipher," in Advances in Cryptology - EuroCrypt '93 (Helleseth, T. ed), LNCS, 765, pp. 386-397, Springer- Verlag, Berlin, 1993.
-
(1993)
Advances in Cryptology - EuroCrypt '93
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
9
-
-
21444458042
-
How to improve the non-linearity of bijective S-boxes
-
Boyd, C. and Dawson, E. eds., LNCS, Springer-Verlag, April
-
Millan, W., "How to Improve the Non-linearity of Bijective S-boxes," in 3rd Australian Conference on Information Security and Privacy (Boyd, C. and Dawson, E. eds.), LNCS, 1438, pp. 181-192, Springer-Verlag, April 1998.
-
(1998)
3rd Australian Conference on Information Security and Privacy
, vol.1438
, pp. 181-192
-
-
Millan, W.1
-
10
-
-
84958657911
-
Evolutionary heuristics for finding cryptographically strong S-Boxes
-
Springer-Verlag
-
Millan, W., Burnett, L., Carter, G., Clark, A. and Dawson, E., "Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes," in ICICS 99, LNCS, 1726, pp. 263-274, Springer-Verlag, 1999.
-
(1999)
ICICS 99, LNCS
, vol.1726
, pp. 263-274
-
-
Millan, W.1
Burnett, L.2
Carter, G.3
Clark, A.4
Dawson, E.5
-
11
-
-
4344642603
-
Smart Hill climbing finds better boolean functions
-
Millan, W., Clark, A. and Dawson, E., "Smart Hill Climbing Finds Better Boolean Functions," in Workshop on Selected Areas on Cryptography, SAC 97, pp. 5063, 1997.
-
(1997)
Workshop on Selected Areas on Cryptography, SAC 97
, pp. 5063
-
-
Millan, W.1
Clark, A.2
Dawson, E.3
-
12
-
-
84961378133
-
Boolean function design using hill climbing methods
-
Schneier, B. ed, LNCS, Springer-Verlag, April
-
Millan, W., Clark, A. and Dawson, E., "Boolean Function Design Using Hill Climbing Methods," in 4th Australian Conference on Information Security and Privacy (Schneier, B. ed), LNCS, 1587, pp. 1-11, Springer-Verlag, April 1999.
-
(1999)
4th Australian Conference on Information Security and Privacy
, vol.1587
, pp. 1-11
-
-
Millan, W.1
Clark, A.2
Dawson, E.3
-
13
-
-
84957625510
-
Heuristic design of cryptographically strong balanced boolean functions
-
Springer-Verlag
-
Millan, W., Clark, A. and Dawson, E., "Heuristic Design of Cryptographically Strong Balanced Boolean Functions," in Advances in Cryptology EUROCRYPT'98, LNCS, 1403, pp. 489-499, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology EUROCRYPT'98, LNCS
, vol.1403
, pp. 489-499
-
-
Millan, W.1
Clark, A.2
Dawson, E.3
-
14
-
-
34248682000
-
Data encryption standard
-
National Bureau of Standards
-
National Bureau of Standards, Data Encryption Standard, NBS FIPS PUB 46, 1976.
-
(1976)
NBS FIPS PUB
, vol.46
-
-
|