Found: 25
Select item for more details and to access through your institution.
Generation of the symmetric group Sn2.
- Published in:
- Discrete Mathematics, Algorithms & Applications, 2022, v. 14, n. 2, p. 1, doi. 10.1142/S179383092150107X
- By:
- Publication type:
- Article
Study of Parameters in the Genetic Algorithm for the Attack on Block Ciphers.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 5, p. 806, doi. 10.3390/sym13050806
- By:
- Publication type:
- Article
Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points †.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 5, p. 777, doi. 10.3390/sym13050777
- By:
- Publication type:
- Article
On the Cryptanalysis of a Simplified AES Using a Hybrid Binary Grey Wolf Optimization.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 18, p. 3982, doi. 10.3390/math11183982
- By:
- Publication type:
- Article
Construction of Boolean Functions from Hermitian Codes.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 6, p. 899, doi. 10.3390/math10060899
- By:
- Publication type:
- Article
Comparación y combinación de dos test efectivos en la detección de contraseñas gráficas no aleatorias en Passpoints.
- Published in:
- Revista Cubana de Ciencias Informáticas, 2023, v. 17, n. 1, p. 78
- By:
- Publication type:
- Article
Conscious Exploration of Alpha-Cuts in the Parametric Solution of the School Bus Routing Problem with Fuzzy Walking Distance.
- Published in:
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/4821927
- By:
- Publication type:
- Article
Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 5, p. N.PAG, doi. 10.3390/s22051987
- By:
- Publication type:
- Article
Matheuristics for the Design of a Multi-Step, Multi-Product Supply Chain with Multimodal Transport.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 21, p. 10251, doi. 10.3390/app112110251
- By:
- Publication type:
- Article
Measuring Avalanche Properties on RC4 Stream Cipher Variants.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 20, p. 9646, doi. 10.3390/app11209646
- By:
- Publication type:
- Article
Search-Space Reduction for S-Boxes Resilient to Power Attacks.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 11, p. 4815, doi. 10.3390/app11114815
- By:
- Publication type:
- Article
Bit Independence Criterion Extended to Stream Ciphers.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 21, p. 7668, doi. 10.3390/app10217668
- By:
- Publication type:
- Article
Practical Improvement in the Implementation of Two Avalanche Tests to Measure Statistical Independence in Stream Ciphers.
- Published in:
- Computation, 2024, v. 12, n. 3, p. 60, doi. 10.3390/computation12030060
- By:
- Publication type:
- Article
A New Family of Boolean Functions with Good Cryptographic Properties.
- Published in:
- Axioms (2075-1680), 2021, v. 10, n. 2, p. 42, doi. 10.3390/axioms10020042
- By:
- Publication type:
- Article
Complexity Reduction in Analyzing Independence between Statistical Randomness Tests Using Mutual Information.
- Published in:
- Entropy, 2023, v. 25, n. 11, p. 1545, doi. 10.3390/e25111545
- By:
- Publication type:
- Article
On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers.
- Published in:
- Entropy, 2023, v. 25, n. 2, p. 261, doi. 10.3390/e25020261
- By:
- Publication type:
- Article
Information Theory Based Evaluation of the RC4 Stream Cipher Outputs.
- Published in:
- Entropy, 2021, v. 23, n. 7, p. 896, doi. 10.3390/e23070896
- By:
- Publication type:
- Article
Selecting an Effective Entropy Estimator for Short Sequences of Bits and Bytes with Maximum Entropy.
- Published in:
- Entropy, 2021, v. 23, n. 5, p. 561, doi. 10.3390/e23050561
- By:
- Publication type:
- Article
Metaheuristics in the Optimization of Cryptographic Boolean Functions.
- Published in:
- Entropy, 2020, v. 22, n. 9, p. 1052, doi. 10.3390/e22091052
- By:
- Publication type:
- Article
Measuring Independence between Statistical Randomness Tests by Mutual Information.
- Published in:
- Entropy, 2020, v. 22, n. 7, p. 741, doi. 10.3390/e22070741
- By:
- Publication type:
- Article
Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles.
- Published in:
- Security & Communication Networks, 2022, v. 2022, p. 1, doi. 10.1155/2022/3624587
- By:
- Publication type:
- Article
New Test to Detect Clustered Graphical Passwords in Passpoints Based on the Perimeter of the Convex Hull.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 8, p. 447, doi. 10.3390/info15080447
- By:
- Publication type:
- Article
Probabilistic Evaluation of the Exploration–Exploitation Balance during the Search, Using the Swap Operator, for Nonlinear Bijective S-Boxes, Resistant to Power Attacks.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 12, p. 509, doi. 10.3390/info12120509
- By:
- Publication type:
- Article
Algorithm to detect and calculate the cerebrospinal fluid (CSF) through Magnetic Resonance Imaging (MRI).
- Published in:
- EAI Endorsed Transactions on Pervasive Health & Technology, 2019, v. 5, n. 20, p. 1, doi. 10.4108/eai.13-7-2018.164179
- By:
- Publication type:
- Article
Probabilistic Evaluation of the Exploration–Exploitation Balance during the Search, Using the Swap Operator, for Nonlinear Bijective S-Boxes, Resistant to Power Attacks.
- Published in:
- Informatics, 2021, v. 8, n. 4, p. 509, doi. 10.3390/info12120509
- By:
- Publication type:
- Article