共 50 条
- [31] Application of Unbalanced Data Approach to Network Intrusion Detection FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 140 - +
- [33] HEURISTIC ALGORITHM FOR OBTAINING PERMUTATIONS WITH GIVEN CRYPTOGRAPHIC PROPERTIES USING A GENERALIZED CONSTRUCTION PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2022, (57): : 5 - 21
- [36] Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512 SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 18 - 35
- [37] Cryptographic properties and structure of Boolean functions with full algebraic immunity 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 734 - +
- [38] Network properties of a pair of generalized polynomials FIBONACCI QUARTERLY, 1999, 37 (04): : 350 - 360
- [39] The structural properties of the generalized Koch network JOURNAL OF STATISTICAL MECHANICS-THEORY AND EXPERIMENT, 2010,
- [40] Cryptographic signals: Requirements, methods of synthesis, properties, application in telecommunication systems Gorbenko, I.D. (gorbenkoi@iit.kharkov.ua), 1600, Begell House Inc. (76): : 1079 - 1100