|
Journals in DBLP
J. Cryptology 1990, volume: 2, number: 3
- R. Forre
Methods and Instruments for Designing S-Boxes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1990, v:2, n:3, pp:115-130 [Journal]
- Michael Walker
Information-Theoretic Bounds for Authentication Schemes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1990, v:2, n:3, pp:131-143 [Journal]
- Sean Murphy
The Cryptanalysis of FEAL-4 with 20 Chosen Plaintexts. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1990, v:2, n:3, pp:145-154 [Journal]
- Chris J. Mitchell
Enumerating Boolean Functions of Cryptographic Significance. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1990, v:2, n:3, pp:155-170 [Journal]
|