共 6 条
[1]
Dawson E., 1997, Information and Communications Security. First International Conference, ICIS '97. Proceedings, P170, DOI 10.1007/BFb0028473
[2]
Matsui M., 1994, ADV CRYPTOLOGY EUROC, P386
[3]
MEIER W, 1990, LECT NOTES COMPUT SC, V434, P549
[4]
SIEGENTHALER T, 1985, IEEE T COMPUT, V34, P81, DOI 10.1109/TC.1985.1676518
[5]
Xian-Mo Zhang, 1996, Designs, Codes and Cryptography, V7, P111, DOI 10.1007/BF00125079
[6]
Zamir Amir R, 2018, TITLE ERROR