메뉴 건너뛰기




Volumn 1841, Issue , 2000, Pages 242-254

Two-stage optimisation in the design of Boolean functions

Author keywords

[No Author keywords available]

Indexed keywords

COST FUNCTIONS; OPTIMIZATION; SECURITY OF DATA; SIMULATED ANNEALING;

EID: 84958973763     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10718964_20     Document Type: Conference Paper
Times cited : (58)

References (12)
  • 1
    • 34248346024 scopus 로고
    • Automated Cryptanalysis of Substitution Ciphers
    • W.S. Forsyth and R. Safavi-Naini. Automated Cryptanalysis of Substitution Ciphers. Cryptologia. vol. 17. No 4. 1993. pp407-418.
    • (1993) Cryptologia , vol.17 , Issue.4 , pp. 407-418
    • Forsyth, W.S.1    Safavi-Naini, R.2
  • 2
    • 0028755308 scopus 로고
    • Automated Cryptanalysis of Transposition Ciphers
    • J.P. Giddy and R. Safavi-Naini Automated Cryptanalysis of Transposition Ciphers. The Computer Journal, (17)4, 1994.
    • (1994) The Computer Journal , vol.17 , Issue.4
    • Giddy, J.P.1    Safavi-Naini, R.2
  • 3
    • 84969387585 scopus 로고
    • On the Norm and Covering Radius of First-order Reed-Muller Codes
    • X.-D Hou. On the Norm and Covering Radius of First-order Reed-Muller Codes. IEEE Transactions on Information Theory, 43(3). May 1983. pp.354-356.
    • (1983) IEEE Transactions on Information Theory , vol.43 , Issue.3 , pp. 354-356
    • Hou, X.-D.1
  • 4
    • 26444479778 scopus 로고
    • Optimization by Simulated Annealing
    • May
    • S. Kirkpatrick and C. D. Gelatt, Jr. and M. P. Vecchi. Optimization by Simulated Annealing. Science, May 1993. pp. 671-680
    • (1993) Science , pp. 671-680
    • Kirkpatrick, S.1    Gelatt, C.D.2    Vecchi, M.P.3
  • 5
    • 84957698062 scopus 로고    scopus 로고
    • Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem
    • Springer Verlag LNCS
    • Lars R. Knudsen and Willi Meier. Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. In Advances in Cryptology Eurocrypt '99, Springer Verlag LNCS 1592 pp. 363-374
    • In Advances in Cryptology Eurocrypt '99 , vol.1592 , pp. 363-374
    • Knudsen, L.R.1    Meier, W.2
  • 6
    • 84950817396 scopus 로고
    • Mathews. The Use of Genetic Algorithms in Cryptanalysis
    • April
    • Robert A J Mathews. The Use of Genetic Algorithms in Cryptanalysis. Cryptologia (17)2, April 1993. pp187-201
    • (1993) Cryptologia , vol.17 , Issue.2 , pp. 187-201
    • Robert, A.J.1
  • 8
    • 84957625510 scopus 로고    scopus 로고
    • Heuristic Design of Crypto-graphically Strong Balanced Boolean Functions
    • Springer Verlag LNCS
    • William Millan, Andrew Clark and Ed Dawson. Heuristic Design of Crypto-graphically Strong Balanced Boolean Functions. In Advances in Cryptology EU-ROCRYPT'98, Springer Verlag LNCS 1403. pp.489-499
    • N Advances in Cryptology EU-ROCRYPT'98 , vol.1403 , pp. 489-499
    • Millan, W.1    Clark, R.2    Ed, D.3
  • 11
    • 84958971342 scopus 로고    scopus 로고
    • The Covering Radius of the (21B, 16) Reed-Muller Code is at Least 16276
    • May
    • N.J. Patterson and D.H. Weidermann. The Covering Radius of the (21B, 16) Reed-Muller Code is at Least 16276. IEEE Transactions on Information Theory, 29(3). May 1997. pp.1025-1027.
    • (1997) IEEE Transactions on Information Theory , vol.29 , Issue.3 , pp. 1025-1027
    • Patterson, N.J.1    Weidermann, D.H.2
  • 12
    • 84912009124 scopus 로고
    • The Use of A Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers
    • April
    • Richard Spillman and Mark Janssen and Bob Nelson and Martin Kepner. The Use of A Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers. Cryptologia (17)1. April 1993. pp. 187-201
    • (1993) Cryptologia , vol.17 , Issue.1 , pp. 187-201
    • Spillman, R.1    Janssen, M.2    Nelson, B.3    Kepner, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.