共 51 条
[2]
Andrushkevych A., 2019, Green IT Engineering: Social, Business and Industrial Applications, P95, DOI [10.1007/978-3-030-00253-4, DOI 10.1007/978-3-030-00253-4]
[3]
[Anonymous], 2015, NISK J
[4]
Aoki K., 2001, Selected Areas in Cryptography. 7th Annual International Workshop, SAC 2000. Proceedings (Lecture Notes in Computer Science Vol.2012), P39
[5]
Banik Subhadeep, 2016, Selected Areas in Cryptography - SAC 2015. 22nd International Conference. Revised Selected Papers: LNCS 9566, P178, DOI 10.1007/978-3-319-31301-6_10
[6]
Biham E, 2005, LECT NOTES COMPUT SC, V3788, P443
[7]
BIHAM E, 1994, J CRYPTOL, V7, P229, DOI 10.1007/BF00203965
[8]
Biham E., 2012, Differential cryptanalysis of the data encryption standard
[9]
Biryukov A, 2010, LECT NOTES COMPUT SC, V6110, P322
[10]
Biryukov A, 2009, LECT NOTES COMPUT SC, V5677, P231, DOI 10.1007/978-3-642-03356-8_14