Login / Signup
Construction of Cryptographically Important Boolean Permutations.
Wenying Zhang
Chuan-Kun Wu
Shiqu Li
Published in:
Appl. Algebra Eng. Commun. Comput. (2004)
Keyphrases
</>
real valued
construction process
data sets
neural network
boolean functions
real time
data mining
machine learning
artificial intelligence
information systems
objective function
search algorithm
information technology
hidden markov models