共 20 条
- [1] Abd-ElGhafar A., 2009, P 13 INT C AER SCI A
- [2] Adams CM, 1993, P 3 S STAT PROGR RES, P181
- [3] [Anonymous], 2814789 GOST
- [4] [Anonymous], 1994, Fast Software Encryption, DOI DOI 10.1007/3-540-58108-1_24
- [5] Biham E., 1993, Differ. Cryptanal. Data Encrypt. Stand., DOI [10.1007/978-1-4613-9314-6, DOI 10.1007/978-1-4613-9314-6]
- [6] El-Sheikh HM., 2012, INT J COMPUTER THEOR, V4, P158, DOI [10.7763/IJCTE.2012.V4.442, DOI 10.7763/IJCTE.2012.V4.442]
- [7] Kazlauskas K, 2009, INFORMATICA-LITHUAN, V20, P23
- [8] Koblitz N., 1994, A Course in Number Theory and Cryptography
- [9] COMPARISON OF RANDOM S-BOX GENERATION METHODS [J]. PUBLICATIONS DE L INSTITUT MATHEMATIQUE-BEOGRAD, 2013, 93 (107): : 109 - 115
- [10] Matsui M., 1993, Advances in Cryptology, V765, P386, DOI [DOI 10.1007/3-540-48285-7, 10.1007/3-540-48285-733, DOI 10.1007/3-540-48285-733]