Works matching IS 08247935 AND DT 2004 AND VI 20 AND IP 3
Results: 7
Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography.
- Published in:
- Computational Intelligence, 2004, v. 20, n. 3, p. 445, doi. 10.1111/j.0824-7935.2004.00244.x
- By:
- Publication type:
- Article
Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion.
- Published in:
- Computational Intelligence, 2004, v. 20, n. 3, p. 450, doi. 10.1111/j.0824-7935.2004.00245.x
- By:
- Publication type:
- Article
New Concepts in Evolutionary Search for Boolean Functions in Cryptology.
- Published in:
- Computational Intelligence, 2004, v. 20, n. 3, p. 463, doi. 10.1111/j.0824-7935.2004.00246.x
- By:
- Publication type:
- Article
Detecting New Forms of Network Intrusion Using Genetic Programming.
- Published in:
- Computational Intelligence, 2004, v. 20, n. 3, p. 475, doi. 10.1111/j.0824-7935.2004.00247.x
- By:
- Publication type:
- Article
Automated Design of Security Protocols.
- Published in:
- Computational Intelligence, 2004, v. 20, n. 3, p. 503, doi. 10.1111/j.0824-7935.2004.00249.x
- By:
- Publication type:
- Article
Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA.
- Published in:
- Computational Intelligence, 2004, v. 20, n. 3, p. 517, doi. 10.1111/j.0824-7935.2004.00250.x
- By:
- Publication type:
- Article
Design of Montgomery Multiplication Architecture Based on Programmable Cellular Automata.
- Published in:
- Computational Intelligence, 2004, v. 20, n. 3, p. 495, doi. 10.1111/j.0824-7935.2004.00248.x
- By:
- Publication type:
- Article