Foydalanilgan Adabiyotlar
1. H. Feistel, W. A. Notz and J. L. Smith, "Some cryptographic techniques for machine-tomachine data communications," in Proceedings of the IEEE, vol. 63, no. 11, pp. 1545-1554, Nov. 1975, doi: 10.1109/PROC.1975.10005
2. Biryukov, A. (2005). Substitution–Permutation (SP) Network. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_420
3. Kim, Jongsung & Hong, Seokhie & Sung, Jaechul & Lee, Sangjin & Lim, Jongin & Sung, Soohak. (2003). Impossible Differential Cryptanalysis for Block Cipher Structures. 2904. 105-132. 10.1007/978-3-540-24582-7_6.
4. Zivkovic, Miodrag & Lambic, Dragan. (2013). Comparison of random S-Box generation methods. Publications de l'Institut Mathematique. 93. 109-115. 10.2298/PIM1307109L.
5. Abduraximov, B. F. S-blokni ifodalovchi algebraik tenglamalar sistemasini qurish algoritmi / B. F. Abduraximov, A. B. Sattarov // Проблемы вычислительной и прикладной математики. – 2018. – No 2(14). – P. 132-145. – EDN KYSDAD.
6. M. N. A. Noughabi and B. Sadeghiyan, "Design of S-boxes based on neural networks*," 2010 International Conference on Electronics and Information Engineering, Kyoto, Japan, 2010, pp. V2-172-V2-178, doi: 10.1109/ICEIE.2010.5559741.
Dostları ilə paylaş: |