Methods and instruments for designing S-boxes
暂无分享,去创建一个
[1] H. Feistel. Cryptography and Computer Privacy , 1973 .
[2] Thomas Siegenthaler,et al. Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.
[3] O. S. Rothaus,et al. On "Bent" Functions , 1976, J. Comb. Theory, Ser. A.
[4] James L. Massey,et al. A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.
[5] John B. Kam,et al. Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.
[6] Sheelagh Lloyd,et al. Counting Functions Satisfying a Higher Order Strict Avalanche Criterion , 1990, EUROCRYPT.
[7] Willi Meier,et al. Nonlinearity Criteria for Cryptographic Functions , 1990, EUROCRYPT.
[8] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[9] R. Titsworth. Correlation properties of cyclic sequences , 1962 .
[10] Réjane Forré,et al. The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.