Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
20
views
20
references
Top references
cited by
7
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,493
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — EUROCRYPT'98
Heuristic design of cryptographically strong balanced Boolean functions
other
Author(s):
William Millan
,
Andrew Clark
,
Ed Dawson
Publication date
(Online):
May 25 2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Path of Science
Most cited references
20
Record
: found
Abstract
: not found
Book Chapter
: not found
Linear Cryptanalysis Method for DES Cipher
Mitsuru Matsui
(1994)
0
comments
Cited
113
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
T. Siegenthaler
(1984)
0
comments
Cited
80
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Differential Cryptanalysis of DES-like Cryptosystems
Eli Biham
,
Adi Shamir
(1991)
0
comments
Cited
58
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1998
Publication date (Online):
May 25 2006
Pages
: 489-499
DOI:
10.1007/BFb0054148
SO-VID:
4df76375-5093-41f9-af3b-2ba383c207fc
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Securing threshold cryptosystems against chosen ciphertext attack
pp. 294
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption
pp. 32
A practical and provably secure scheme for publicly verifiable secret sharing and its applications
pp. 59
Breaking RSA may not be equivalent to factoring
pp. 72
Lower bounds on generic algorithms in groups
pp. 145
Optimum traitor tracing and asymmetric schemes
pp. 158
On finding small solutions of modular multivariate polynomial equations
pp. 221
Speeding up discrete log and factoring based schemes via precomputations
pp. 236
Fast batch verification for modular exponentiation and digital signatures
pp. 266
Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible
pp. 334
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
pp. 361
On the foundations of oblivious transfer
pp. 391
Strengthened security for blind signatures
pp. 406
Generic constructions for secure and efficient confirmer signature schemes
pp. 422
Security analysis of a practical “on the fly” authentication and signature generation
pp. 437
Universally verifiable mix-net with verification work independent of the number of mix-servers
pp. 448
A practical mix
pp. 475
Highly nonlinear balanced Boolean functions with a good correlation-immunity
pp. 489
Heuristic design of cryptographically strong balanced Boolean functions
pp. 512
Combinatorial bounds for broadcast encryption
pp. 561
Easy come — Easy go divisible cash
pp. 591
Optimistic fair exchange of digital signatures
Similar content
4,493
Finitary Boolean functions
Authors:
Vilhelm Agdur
Cryptographic protocols
Authors:
Richard Demillo
,
Nancy A. Lynch
,
Michael J. Merritt
'Commission Implementing Regulation (EU) No 699/2014 of 24 June 2014 on the design of the common logo to identify persons offering medicinal products for sale at a distance to the public and the technical, electronic and cryptographic requirements for',
Authors:
J.M. BARROSO
See all similar
Cited by
7
Search for Boolean Functions With Excellent Profiles in the Rotation Symmetric Class
Authors:
Subhamoy Maitra
,
Seluk Kavut
,
Melek D. Yucel
The design of S-boxes by simulated annealing
Authors:
John Clark
,
Jeremy Jacob
,
Susan Stepney
Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables
Authors:
,
See all cited by