Search Page
Save citations to file
Email citations
Send citations to clipboard
Add to Collections
Add to My Bibliography
Create a file for external citation management software
Your saved search
Your RSS Feed
Search Results
2 results
Filters applied: . Clear all
Results are displayed in a computed author sort order.
The Results By Year timeline is not available.
Page 1
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.
ScientificWorldJournal. 2015;2015:743618. doi: 10.1155/2015/743618. Epub 2015 Sep 28.
ScientificWorldJournal. 2015.
PMID: 26491717
Free PMC article.
Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography.
Picek S, Carlet C, Guilley S, Miller JF, Jakobovic D.
Picek S, et al. Among authors: guilley s.
Evol Comput. 2016 Winter;24(4):667-694. doi: 10.1162/EVCO_a_00190. Epub 2016 Aug 2.
Evol Comput. 2016.
PMID: 27482749
Item in Clipboard
Cite
Cite