Author: Lu Jiqiang
Publisher: Springer Publishing Company
ISSN: 0925-1022
Source: Designs, Codes and Cryptography, Vol.60, Iss.2, 2011-08, pp. : 123-143
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Critique of the related-key attack concept
By Harris David
Designs, Codes and Cryptography, Vol. 59, Iss. 1-3, 2011-04 ,pp. :
Construction of block designs and related results
Bulletin of the Australian Mathematical Society, Vol. 19, Iss. 1, 1978-08 ,pp. :
The Mathematical Gazette, Vol. 94, Iss. 531, 2010-11 ,pp. :
I, Claudius and the cipher extraordinary
The Mathematical Gazette, Vol. 96, Iss. 537, 2012-11 ,pp. :
Application of Maximum Entropy Principle in Key Sector Analysis
Systems Analysis Modelling Simulation, Vol. 42, Iss. 9, 2002-01 ,pp. :