Published in

Springer, Lecture Notes in Computer Science, p. 192-204, 2015

DOI: 10.1007/978-3-319-16501-1_16

Links

Tools

Export citation

Search in Google Scholar

Evolutionary Methods for the Construction of Cryptographic Boolean Functions

This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Red circle
Preprint: archiving forbidden
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO