Voir la notice de l'article provenant de la source Math-Net.Ru
[1] Isa H., Jamil N., Z'aba M., “Hybrid heuristic methods in constructing cryptographically strong S-boxes”, Int. J. Cryptology Research, 6:1 (2016), 1–15 | MR
[2] Ivanov G., Nikolov N., Nikova S., “Cryptographically strong S-boxes generated by modified immune algorithm”, Lect. Notes Comput. Sci., 9540, 2015, 31–42 | DOI
[3] Ivanov G., Nikolov N., Nikova S., “Reversed genetic algorithms for generation of bijective S-boxes with good cryptographic properties”, Cryptogr. and Communic., 8:2 (2016), 247–276 | DOI | MR | Zbl
[4] Menyachihin A.V., “Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters”, Matematicheskie Voprosy Kriptografii, 8:2 (2017), 97–116 | DOI | MR
[5] Menyachihin A.V., The method for generating s-boxes by using elements of linear and differential spectra and device implementing it, Patent RU 2633132, 29, 2017
[6] Kazymyrov O.V., Kazymyrova V.N., Oliynykov R.V., “A method for generation of high-nonlinear S-boxes based on gradient descent”, Mathematicheskie Voprosy Kriptografii, 5:2 (2014), 71–78 | DOI
[7] Millan W., Clark A., Dawson E., “Boolean functions design using hill climbing methods”, Lect. Notes Comput. Sci., 1587, 1999, 1–11 | DOI | Zbl
[8] Millan W., “How to improve the nonlinearity of bijective S-boxes”, Australian Conf. Inf. Security and Privacy, Lect. Notes Comput. Sci., 1438, 1998, 181–192 | DOI | MR | Zbl
[9] Tesar P., “A new method for generating high non-linearity S-boxes”, Radioengineering, 19:1 (2010), 23–26
[10] Yu Y., Wang M., Li Y., “Constructing differentially 4-uniform permutation from known ones”, Chinese J. Electronics, 22:2 (2013), 495–499