Search Page
Save citations to file
Email citations
Send citations to clipboard
Add to Collections
Add to My Bibliography
Create a file for external citation management software
Your saved search
Your RSS Feed
Filters
Results by year
Table representation of search results timeline featuring number of search results per year.
Year | Number of Results |
---|---|
2015 | 1 |
2016 | 1 |
2024 | 0 |
Search Results
2 results
Results by year
Filters applied: . Clear all
Page 1
Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography.
Evol Comput. 2016 Winter;24(4):667-694. doi: 10.1162/EVCO_a_00190. Epub 2016 Aug 2.
Evol Comput. 2016.
PMID: 27482749
Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.
DeTrano A, Karimi N, Karri R, Guo X, Carlet C, Guilley S.
DeTrano A, et al. Among authors: guilley s.
ScientificWorldJournal. 2015;2015:743618. doi: 10.1155/2015/743618. Epub 2015 Sep 28.
ScientificWorldJournal. 2015.
PMID: 26491717
Free PMC article.
Item in Clipboard
Cite
Cite