References
- M. Baczyński and B. Jayaram, Fuzzy Implications, Studies in Fuzziness and Soft Computing, Vol. 231, Springer-Verlag, Berlin, 2008.
- B.C. Bedregal, R.H.S. Reiser, and G.P. Dimuro, Xor-implications and E-implications: classes of fuzzy implications based on fuzzy Xor, Electron. Notes Theor. Comput. Sci. 247 (2009), 5–18.
- B.C. Bedregal, R.H.S. Reiser, and G.P. Dimuro, Revisiting Xor-implications: classes of fuzzy (co)implications based on f-Xor (f-XNor) connectives, Internat. J. Uncertain. Fuzziness Knowledge-Based Systems 21 (2013), no. 6, 899–925.
- G. Bongiovanni and P. Penna, XOR-based schemes for fast parallel IP lookups, Theory Comput. Syst. 38 (2005), no. 4, 481–501.
- E.G. Codding and G. Horlick, Application of AND and exclusive-or (XOR) logic operations to the identification of elemental emission spectra measured using a photodiode array direct reading spectrometer, Appl. Spectrosc. 27 (1973), no. 5, 366–370.
- M.M. Gupta, A. Kandel, W. Bandler, and J.B. Kiszka (Eds.), Approximate Reasoning in Expert Systems, North-Holland Publishing Co., Amsterdam, 1985.
- Y. Horikawa, Landscapes of basins of local minima in the XOR problem, in: Proceedings of 1993 International Conference on Neural Networks (IJCNN-93-Nagoya, Japan), IEEE, 1993, pp. 1677–1680.
- L. Kohout and E. Kim, Characterization of interval fuzzy logic systems of connectives by group transformations, Reliab. Comput. 10 (2004), no. 4, 299–334.
- A.G. Konheim, Computer Security and Cryptography, John Wiley & Sons, Inc., Hoboken, 2007.
- M. Maeda, M. Suenaga, and H. Miyajima, Qubit neuron according to quantum circuit for XOR problem, Appl. Math. Comput. 185 (2007), no. 2, 1015–1025.
- C.F. Mela and D.R. Lehmann, Using fuzzy set theoretic techniques to identify preference rules from interactions in the linear model: an empirical study, Fuzzy Sets and Systems 71 (1995), no. 2, 165–181.
- N.D. Mermin, Quantum Computer Science. An Introduction, Cambridge University Press, Cambridge, 2007.
- W. Pedrycz and G. Succi, fXOR fuzzy logic networks, Soft Comput. 7 (2002), no. 2, 115–120.
- C. Shannon, Communication theory of secrecy systems, Bell System Tech. J. 28 (1949), 656–715.
- W. Stallings, Cryptography and Network Security. Principles and Practice, Prentice Hall, Upper Saddle River, 1999.
- H. Vandierendonck and K. De Bosschere, XOR-based hash functions, IEEE Trans. Comput. 54 (2005), no. 7, 800–812.
- H. Vandierendonck, P. Manet, and J.-D. Legat, Application-specific reconfigurable XOR-indexing to eliminate cache conflict misses, in: Proceedings of the Design Automation & Test in Europe Conference, IEEE, 2006, pp. 357–362.