Author of the publication

The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.

, and . ACM Conference on Computer and Communications Security, page 148-155. ACM, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Avalanche Characteristics of Substitution-Permutation Encryption Networks., and . IEEE Trans. Computers, 44 (9): 1131-1139 (1995)Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis., and . Inf. Process. Lett., 56 (5): 249-252 (1995)Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion"., and . Inf. Process. Lett., 60 (5): 271-275 (1996)Synchronization of Cyclic Codes in the Presence of Burst Errors, and . Inf. Control., 14 (5): 423-441 (May 1969)Generating Bent Sequences., and . Discret. Appl. Math., 39 (2): 155-159 (1992)Good S-Boxes Are Easy To Find., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 612-615. Springer, (1989)Flexible Access Control with Master Keys., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 316-322. Springer, (1989)The Structured Design of Cryptographically Good S-Boxes., and . J. Cryptol., 3 (1): 27-41 (1990)A Design of a Fast Pipelined Modular Multiplier Based on a Diminished-Radix Algorithm., , and . J. Cryptol., 6 (4): 183-208 (1993)The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis., and . ACM Conference on Computer and Communications Security, page 148-155. ACM, (1994)