共 58 条
[1]
Adams C.M., A Formal and Practical Design Procedure for Substitution-permutation Network Cryptosystems, (1990)
[2]
Adams C.M., Tavares S.E., The Use of Bent Sequences to Achieve Higher-order Strict Avalanche Criterion in S-box Design, (1990)
[3]
Adams C.M., Tavares S.E., Generating and counting binary bent sequences, IEEE Transactions on Information Theory, IT-36, pp. 1170-1173, (1990)
[4]
Adams C.M., On immunity against Biham and Shamir's "Differential Cryptanalysis, Information Processing Letters, 41, pp. 77-80, (1992)
[5]
Adams C.M., Tavares S.E., Designing s-boxes for ciphers resistant to differential cryptanalysis, Proceedings of the 3rd Symposium on the State and Progress of Research in Cryptography, pp. 181-190, (1993)
[6]
Adams C.M., Simple and effective key scheduling for symmetric ciphers, Workshop Record of the Workshop on Selected Areas in Cryptography (SAC 94), pp. 129-133, (1994)
[7]
Adams C.M., Designing DES-like ciphers with guaranteed resistance to differential and linear attacks, Workshop Record of the Workshop on Selected Areas in Cryptography (SAC 95), pp. 133-144, (1995)
[8]
Biham E., Shamir A., Differential Cryptanalysis of the Data Encryption Standard, (1993)
[9]
Biham E., New types of cryptanalytic attacks using related keys, Advances in Cryptology: Proc. of Eurocrypt '93, pp. 398-409, (1994)
[10]
Brown L., Pieprzyk J., Seberry J., LOKI - A cryptographic primitive for authentication and secrecy applications, Advances in Cryptology: Proc. of Auscrypt '90, pp. 229-236, (1990)