共 50 条
- [2] SHA-1 and the Strict Avalanche Criterion 2016 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE 2016 ISSA CONFERENCE, 2016, : 35 - 40
- [4] Alternative of Strict Avalanche Criterion Test on Block Cipher Using Fisher's Method INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2015, 53 (05): : 33 - 39
- [7] Performance Analysis of Encryption Techniques Based on Avalanche effect and Strict Avalanche Criterion ICSPC'21: 2021 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICPSC), 2021, : 676 - 679
- [9] An upper bound for the number of functions satisfying the strict avalanche criterion DISCRETE MATHEMATICS AND APPLICATIONS, 2005, 15 (03): : 263 - 269
- [10] Improvement of the polymorphic cipher and its analysis of the strict avalanche criterion Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2009, 35 (06): : 851 - 855