A New Method for Known Plaintext Attack of FEAL Cipher, Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques. EUROCRYPT'92, pp.81-91, 1993. ,
DOI : 10.1007/3-540-47555-9_7
Differential Cryptanalysis of DES-like Cryptosystems, Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology. CRYPTO '90, pp.2-21, 1991. ,
R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, 2013. ,
The boolfun Package: Cryptographic Properties of Boolean Functions, 2013. ,
Cryptographic Boolean Functions with R, The R Journal, vol.3, issue.1, pp.44-47, 2011. ,
The Sage Development Team, Sage Mathematics Software, 2013. ,
A c++ class for analysing vector boolean functions from a cryptographic perspective, Security and Cryptography (SECRYPT) Proceedings of the 2010 International Conference on, pp.1-9, 2010. ,
The Block Cipher Companion. Information Security and Cryptography, 2011. ,
Cryptographic Properties of Boolean Functions and S-Boxes, 2006. ,
Boolean Models and Methods in Mathematics, 2010. ,
Differential Power Analysis Model and Some Results, pp.127-142, 2004. ,
DOI : 10.1007/1-4020-8147-2_9
DPA Attacks and S-Boxes, Lecture Notes in Computer Science, vol.3557, pp.424-441, 2005. ,
DOI : 10.1007/11502760_29
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks, Proceedings of the 6th international conference on Cryptology in India. INDOCRYPT'05, pp.49-62, 2005. ,
DOI : 10.1007/11596219_5
Heuristic Optimization of Boolean Functions and Substitution Boxes for Cryptography, 2005. ,
GAC ??? the Criterion for Global Avalanche Characteristics of Cryptographic Functions, Journal of Universal Computer Science, vol.1, issue.5, pp.316-333, 1995. ,
DOI : 10.1007/978-3-642-80350-5_30
The design of S-boxes by simulated annealing, New Generation Computing, vol.220, issue.4598, pp.219-231, 2005. ,
DOI : 10.1007/BF03037656
Propagation Characteristics of Boolean Functions, Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology . EUROCRYPT '90, pp.161-173, 1991. ,
DOI : 10.1007/3-540-46877-3_14
A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS, Cryptologia, vol.26, issue.3, 2001. ,
DOI : 10.1080/0161-110291890885
Perfect nonlinear S-boxes, Proceedings. Lecture Notes in Computer Science, vol.547, pp.378-386, 1991. ,
DOI : 10.1007/3-540-46416-6_32
Systematic Generation of Cryptographically Robust S-boxes (Extended Abstract), Proceedings of the First ACM Conference on Computer and Communications Security, pp.172-182, 1993. ,
The Design of Rijndael, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Cryptographic Analysis of All 4 ?? 4-Bit S-Boxes, Lecture Notes in Computer Science, vol.8, issue.1, pp.118-133, 2012. ,
DOI : 10.1007/978-3-540-25937-4_18
A Fast Implementation of Computing the Transparency Order of S-Boxes, 2008 The 9th International Conference for Young Computer Scientists, pp.206-211, 2008. ,
DOI : 10.1109/ICYCS.2008.302
The rakaposhi Stream Cipher, Lecture Notes in Computer Science, vol.5927, pp.32-46, 2009. ,
DOI : 10.1007/978-3-642-11145-7_5
rbenchmark: Benchmarking routine for R, 2012. ,