Publication | Closed Access
Improving the strict avalanche characteristics of cryptographic functions
19
Citations
3
References
1994
Year
Hardware SecurityCryptographic PrimitiveEngineeringInformation SecurityCryptographic ProtectionData PrivacyComputer ScienceStrict Avalanche CharacteristicsData SecurityCryptographyCryptanalysis
| Year | Citations | |
|---|---|---|
Page 1
Page 1