-
1
-
-
0002555945
-
Differential cryptanalysis of DES-like cryptosystems
-
Alfred J. Menezes and Scott A. Vanstone, editors, Berlin, Springer-Verlag, Lecture Notes in Computer Science Volume 537
-
E. Biham and A. Shamir. Differential Cryptanalysis of DES-like Cryptosystems (Extended Abstract). In Alfred J. Menezes and Scott A. Vanstone, editors, Advances in Cryptology - Crypto '90, pages 2-21, Berlin, 1990, Springer-Verlag, Lecture Notes in Computer Science Volume 537.
-
(1990)
Advances in Cryptology - Crypto '90
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
2
-
-
84958973763
-
Two stage optimisation in the design of boolean functions
-
Ed Dawson, Andrew Clark, and Colin Boyd, editors, Springer Verlag LNCS 1841, July
-
John A Clark and Jeremy L Jacob. Two Stage Optimisation in the Design of Boolean Functions. In Ed Dawson, Andrew Clark, and Colin Boyd, editors, 5th Australasian Conference on Information Security and Privacy, ACISP 2000, pages 242-254, Springer Verlag LNCS 1841, July 2000.
-
(2000)
5th Australasian Conference on Information Security and Privacy, ACISP 2000
, pp. 242-254
-
-
Clark, J.A.1
Jacob, J.L.2
-
3
-
-
4344581166
-
Searching for cost functions
-
Portland, USA, June 2004, (these proceedings)
-
John A. Clark, Jeremy L. Jacob, and Susan Stepney. Searching for cost functions. In CEC 2004: International Conference on Evolutionary Computation, Portland, USA, June 2004, 2004. (these proceedings).
-
(2004)
CEC 2004: International Conference on Evolutionary Computation
-
-
Clark, J.A.1
Jacob, J.L.2
Stepney, S.3
-
4
-
-
84974720866
-
Evolving boolean functions satisfying multiple criteria
-
Springer Verlag LNCS 2551
-
John A Clark, Jeremy L Jacob, Susan Stepney, Subhamoy Maitra, and William Millan. Evolving Boolean Functions Satisfying Multiple Criteria. In Progress in Cryptology - INDOCRYPT2002, pages 246-259. Springer Verlag LNCS 2551, 2002.
-
(2002)
Progress in Cryptology - INDOCRYPT2002
, pp. 246-259
-
-
Clark, J.A.1
Jacob, J.L.2
Stepney, S.3
Maitra, S.4
Millan, W.5
-
5
-
-
4344693030
-
A tutorial on linear and differential cryptanalysis
-
Electrical and Computer Engineering, University of Newfoundland, St. John's, Newfoundland, Canada
-
Howard Heys. A tutorial on linear and differential cryptanalysis. Technical report, Electrical and Computer Engineering, University of Newfoundland, St. John's, Newfoundland, Canada.
-
Technical Report
-
-
Heys, H.1
-
7
-
-
26444479778
-
-
May
-
S. Kirkpatrick, Jr. C. D. Gelatt, and M. P. Vecchi. Optimization by Simulated Annealing. Science, 220(4598):671-680, May 1983.
-
(1983)
Optimization by Simulated Annealing. Science
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick Jr., S.1
Gelatt, C.D.2
Vecchi, M.P.3
-
8
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Tor Helleseth, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science Volume 765
-
M. Matsui. Linear Cryptanalysis Method for DES Cipher. In Tor Helleseth, editor, Advances in Cryptology - EuroCrypt '93, pages 386-397, Berlin, 1993. Springer-Verlag. Lecture Notes in Computer Science Volume 765.
-
(1993)
Advances in Cryptology - EuroCrypt '93
, pp. 386-397
-
-
Matsui, M.1
-
10
-
-
21444458042
-
How to improve the non-linearity of bijective s-boxes
-
C. Boyd and E. Dawson, editors, Springer-Verlag, April Lecture Notes in Computer Science Volume 1438
-
W Millan. How to Improve the Non-linearity of Bijective S-boxes. In C. Boyd and E. Dawson, editors, 3rd Australian Conference on Information Security and Privacy, pages 181-192, Springer-Verlag, April 1998. Lecture Notes in Computer Science Volume 1438.
-
(1998)
3rd Australian Conference on Information Security and Privacy
, pp. 181-192
-
-
Millan, W.1
-
11
-
-
4344682494
-
Evolutionary heuristics for finding cryptographically strong s-boxes
-
W. Millan, L. Burnett, G. Carter, A. Clark, and E. Dawson. Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. In ICICS 99, 1999.
-
(1999)
ICICS 99
-
-
Millan, W.1
Burnett, L.2
Carter, G.3
Clark, A.4
Dawson, E.5
-
12
-
-
84961378133
-
Boolean function design using hill climbing methods
-
Bruce Schneier, editor, Springer-Verlag, april Lecture Notes in Computer Science Volume 1978
-
W. Millan, A. Clark, and E. Dawson. Boolean Function Design Using Hill Climbing Methods. In Bruce Schneier, editor, 4th Australian Conference on Information Security and Privacy. Springer-Verlag, april 1999. Lecture Notes in Computer Science Volume 1978.
-
(1999)
4th Australian Conference on Information Security and Privacy
-
-
Millan, W.1
Clark, A.2
Dawson, E.3
-
13
-
-
84957625510
-
Heuristic design of cryptographically strong balanced boolean functions
-
Springer Verlag LNCS 1403
-
William Millan, Andrew Clark, and Ed Dawson. Heuristic Design of Cryptographically Strong Balanced Boolean Functions. In Advances in Cryptology EUROCRYPT'98, pages 489-499. Springer Verlag LNCS 1403, 1998.
-
(1998)
Advances in Cryptology EUROCRYPT'98
, pp. 489-499
-
-
Millan, W.1
Clark, A.2
Dawson, E.3
-
14
-
-
34248682000
-
Data encryption standard
-
National Bureau of Standards. Data Encryption Standard. NBS FIPS PUB 46, 1976.
-
(1976)
NBS FIPS PUB
, vol.46
-
-
|