-
2
-
-
46549085794
-
-
R. Anderson, E. Biham, L. Knudsen, Serpent: a proposal for the advanced encryption standard, NIST Proposal. (1998). .
-
R. Anderson, E. Biham, L. Knudsen, Serpent: a proposal for the advanced encryption standard, NIST Proposal. (1998). .
-
-
-
-
6
-
-
46549084610
-
-
A. Ghaemi Bafghi, Modeling of block ciphers differential operations for finding their differential characteristics with neural networks and ant colony, PhD Thesis, Computer Engineering Department, Amikabir University of Technology, 2004.
-
A. Ghaemi Bafghi, Modeling of block ciphers differential operations for finding their differential characteristics with neural networks and ant colony, PhD Thesis, Computer Engineering Department, Amikabir University of Technology, 2004.
-
-
-
-
7
-
-
46549087890
-
A Differential operation model to representation of substitution-permutation block ciphers an outline
-
Ghaemi Bafghi A., and Sadeghiyan B. A Differential operation model to representation of substitution-permutation block ciphers an outline. Amirkabir J. 15/58-A (2003)
-
(2003)
Amirkabir J.
, vol.15-58 A
-
-
Ghaemi Bafghi, A.1
Sadeghiyan, B.2
-
8
-
-
46549084692
-
-
A. Ghaemi Bafghi, B. Sadeghiyan, Differential model of block ciphers with ant colony technique, in: Proceedings of the Second International Symposium on Telecommunications, Iran, 2003, 556-560.
-
A. Ghaemi Bafghi, B. Sadeghiyan, Differential model of block ciphers with ant colony technique, in: Proceedings of the Second International Symposium on Telecommunications, Iran, 2003, 556-560.
-
-
-
-
10
-
-
0020118274
-
Neural networks and physical systems with emergent collective computational abilities
-
Hopfield J. Neural networks and physical systems with emergent collective computational abilities. Proc. Natl. Acad. Sci. 79 (1982) 2554-2558
-
(1982)
Proc. Natl. Acad. Sci.
, vol.79
, pp. 2554-2558
-
-
Hopfield, J.1
-
11
-
-
0021835689
-
Neural computation of decisions in optimization problems
-
Hopfield J., and Tank D.W. Neural computation of decisions in optimization problems. Biol. Cybern. 52 (1985) 141-152
-
(1985)
Biol. Cybern.
, vol.52
, pp. 141-152
-
-
Hopfield, J.1
Tank, D.W.2
-
12
-
-
46549084892
-
-
T. Kohono, J. Kelsey, B. Schneier, Preliminary cryptanalysis of reduced-round serpent, in: Third AES Candidate Conference, 2000, .
-
T. Kohono, J. Kelsey, B. Schneier, Preliminary cryptanalysis of reduced-round serpent, in: Third AES Candidate Conference, 2000, .
-
-
-
-
13
-
-
34047158699
-
Attacks of simple block ciphers via efficient heuristics
-
Nalini N., and RaghavendraRao G. Attacks of simple block ciphers via efficient heuristics. Inform. Sci. 177/12 (2007) 2553-2569
-
(2007)
Inform. Sci.
, vol.177-12
, pp. 2553-2569
-
-
Nalini, N.1
RaghavendraRao, G.2
-
14
-
-
0024921358
-
-
Y. Takefuji, H. Szu, Design of parallel distributed cauchy machines, in: Proceedings of First IEEE International Joint Conference on Neural Networks, 1989, pp. 529-532.
-
Y. Takefuji, H. Szu, Design of parallel distributed cauchy machines, in: Proceedings of First IEEE International Joint Conference on Neural Networks, 1989, pp. 529-532.
-
-
-
-
15
-
-
33846288293
-
Finding an internal state of RC4 stream cipher
-
Tomasevic V., Bojanic S., and Nieto-Taladriz O. Finding an internal state of RC4 stream cipher. Inform. Sci. 177/7 (2007) 1715-1727
-
(2007)
Inform. Sci.
, vol.177-7
, pp. 1715-1727
-
-
Tomasevic, V.1
Bojanic, S.2
Nieto-Taladriz, O.3
-
16
-
-
46549090185
-
-
X.Y. Wang, L.C. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, H.W. Chan, The differential cryptanalysis of an AES finalist-serpent, Technical Report TR-2000-04, 2000.
-
X.Y. Wang, L.C. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, H.W. Chan, The differential cryptanalysis of an AES finalist-serpent, Technical Report TR-2000-04, 2000.
-
-
-
-
17
-
-
33745983856
-
OWA trees and their role in security modeling using attack trees
-
Yager R.R. OWA trees and their role in security modeling using attack trees. Inform. Sci. 176/20 (2006) 2933-2959
-
(2006)
Inform. Sci.
, vol.176-20
, pp. 2933-2959
-
-
Yager, R.R.1
|