共 16 条
[1]
Bay A., 2014, ADV INFORM COMPUTER, P204
[2]
Bay A, 2010, LECT NOTES COMPUT SC, V6467, P1, DOI 10.1007/978-3-642-17619-7_1
[3]
Biham E, 2005, LECT NOTES COMPUT SC, V3494, P507
[4]
Biham E, 2002, LECT NOTES COMPUT SC, V2365, P1
[5]
Biham E, 2001, LECT NOTES COMPUT SC, V2045, P340
[6]
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[7]
BIHAM E, 1994, J CRYPTOL, V7, P229, DOI 10.1007/BF00203965
[8]
Hong S, 2005, LECT NOTES COMPUT SC, V3557, P368
[9]
Izadi M, 2009, LECT NOTES COMPUT SC, V5888, P334, DOI 10.1007/978-3-642-10433-6_22
[10]
Kelsey J., 2001, Fast Software Encryption. 7th International Workshop, FSE 2000. Proceedings (Lecture Notes in Computer Science Vol.1978), P75