共 10 条
- [1] Abed I. A., 2010, J BASRAH RES SCI, V36, P72
- [2] Bhowmik S., 2011, 2011 Proceedings of IEEE International Conference on Computer Science and Automation Engineering (CSAE), P223, DOI 10.1109/CSAE.2011.5952458
- [3] Biryukov A, 2002, LECT NOTES COMPUT SC, V2513, P315
- [4] Daemen J., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P224
- [5] De-Hong Zhu, 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010), P18, DOI 10.1109/ICICISYS.2010.5658827
- [6] Ghosh R., 2012, INT J ADV RES COMPUT, V2, P263
- [7] Goldberg D.E., 2009, GENETIC ALGORITHMS S
- [8] Goyat S., 2012, INT J SOFT COMPUTING, V2
- [9] Hawkes P, 1998, LECT NOTES COMPUT SC, V1403, P112, DOI 10.1007/BFb0054121
- [10] Schneier B., 1996, APPL CRYPTOGRAPHY PR