최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Physics letters: A, v.384 no.10, 2020년, pp.126214 -
Hu, Feng (China Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai Institute for Advanced Communication and Data Science, Shanghai University) , Lamata, Lucas (Departamento de Fí) , Sanz, Mikel (sica Ató) , Chen, Xi (mica, Molecular y Nuclear, Universidad de Sevilla) , Chen, Xingyuan (Department of Physical Chemistry, University of the Basque Country UPV) , Wang, Chao (Department of Physical Chemistry, University of the Basque Country UPV) , Solano, Enrique (State Key Laboratory of Cryptology)
Abstract As the building block in symmetric cryptography, designing Boolean functions satisfying multiple properties is an important problem in sequence ciphers, block ciphers, and hash functions. However, the search of n-variable Boolean functions fulfilling global cryptographic constraints is com...
Carlet 257 2010 Boolean Models and Methods in Mathematics, Computer Science, and Engineering, vol. 2 Boolean functions for cryptography and error correcting codes
Willi 301 1988 Advances in Cryptology, EUROCRYPT 88 Fast correlation attacks on stream ciphers
Courtois 176 2003 Annual International Cryptology Conference Fast algebraic attacks on stream ciphers with linear feedback
Carlet 549 2002 Annual International Cryptology Conference A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction
IEEE Trans. Inf. Theory Tang 59 653 2013 10.1109/TIT.2012.2217476 Highly nonlinear Boolean functions with optimal algebraic immunity and good behavior against fast algebraic attacks
Appl. Soft Comput. Picek 40 635 2016 10.1016/j.asoc.2015.10.066 Cryptographic Boolean functions: one output, many design criteria
Ding 1991 The Stability Theory of Stream Ciphers
Inf. Sci. Zhang 376 21 2017 10.1016/j.ins.2016.10.001 Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria
Carlet 2002 Proc. of 23rd Symposium on Information Theory in the Benelux Upper bounds on the numbers of resilient functions and of bent functions
Inf. Sci. Pang 450 336 2018 10.1016/j.ins.2018.03.052 Construction and count of 1-resilient rotation symmetric Boolean functions
Chem. Phys. Lett. Finnila 219 343 1994 10.1016/0009-2614(94)00117-0 Quantum annealing: a new method for minimizing multidimensional functions
Nat. Phys. Boixo 14 595 2018 10.1038/s41567-018-0124-x Characterizing quantum supremacy in near-term devices
Nat. News Castelvecchi 541 7635 2017 10.1038/541009a Quantum computers ready to leap out of the lab in 2017
Pednault
Nature Johnson 473 194 2011 10.1038/nature10012 Quantum annealing with manufactured spins
Sci. Rep. O'Malley 8 6919 2018 10.1038/s41598-018-25206-0 An approach to quantum-computational hydrologic inverse analysis
Nature Mott 550 375 2017 10.1038/nature24047 Solving a Higgs optimization problem with quantum annealing for machine learning
Sci. Rep. Dridi 7 2017 Prime factorization using quantum annealing and computational algebraic geometry
Sci. Rep. Perdomo-Ortiz 2 571 2012 10.1038/srep00571 Finding low-energy conformations of lattice protein models by quantum annealing
Courtland 2014 D-Wave Aims to Bring Quantum Computing to the Cloud
Wang 31 2012 Information Security and Communications Privacy, vol. 2 Impact of commercial quantum computer on cryptography
Chin. J. Netw. Inf. Secur. Wang 2 3 2016 Shaping the future of commercial quantum computer and the challenge for information security
Sci. Rep. Jiang 8 2018 10.1038/s41598-018-36058-z Quantum annealing for prime factorization
Ding 1991 The Stability Theory of Stream Ciphers
Willi 301 1988 Advances in Cryptology-EUROCRYPT 88 Fast correlation attacks on stream ciphers
MacWilliams 1977 The Theory of Error-Correcting Codes
Millan 489 1998 International Conference on the Theory and Applications of Cryptographic Techniques Heuristic design of cryptographically strong balanced Boolean functions
Carlet 549 2002 Annual International Cryptology Conference A larger class of cryptographic Boolean functions via a study of the Maiorana-McFarland construction
Des. Codes Cryptogr. Tu 60 1 2011 10.1007/s10623-010-9413-9 A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity
Appl. Soft Comput. Picek 40 635 2016 10.1016/j.asoc.2015.10.066 Cryptographic Boolean functions: one output, many design criteria
Hrbacek 414 2014 International Conference on Parallel Problem Solving from Nature Bent function synthesis by means of Cartesian genetic programming
Nat. Commun. Pudenz 5 3243 2014 10.1038/ncomms4243 Error-corrected quantum annealing with hundreds of qubits
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.