M. Baczyński and B. Jayaram, Fuzzy Implications, Studies in Fuzziness and Soft Computing, Vol. 231, Springer-Verlag, Berlin, 2008.
Google Scholar
B.C. Bedregal, R.H.S. Reiser, and G.P. Dimuro, Xor-implications and E-implications: classes of fuzzy implications based on fuzzy Xor, Electron. Notes Theor. Comput. Sci. 247 (2009), 5–18.
Google Scholar
B.C. Bedregal, R.H.S. Reiser, and G.P. Dimuro, Revisiting Xor-implications: classes of fuzzy (co)implications based on f-Xor (f-XNor) connectives, Internat. J. Uncertain. Fuzziness Knowledge-Based Systems 21 (2013), no. 6, 899–925.
Google Scholar
G. Bongiovanni and P. Penna, XOR-based schemes for fast parallel IP lookups, Theory Comput. Syst. 38 (2005), no. 4, 481–501.
Google Scholar
E.G. Codding and G. Horlick, Application of AND and exclusive-or (XOR) logic operations to the identification of elemental emission spectra measured using a photodiode array direct reading spectrometer, Appl. Spectrosc. 27 (1973), no. 5, 366–370.
Google Scholar
M.M. Gupta, A. Kandel, W. Bandler, and J.B. Kiszka (Eds.), Approximate Reasoning in Expert Systems, North-Holland Publishing Co., Amsterdam, 1985.
Google Scholar
Y. Horikawa, Landscapes of basins of local minima in the XOR problem, in: Proceedings of 1993 International Conference on Neural Networks (IJCNN-93-Nagoya, Japan), IEEE, 1993, pp. 1677–1680.
Google Scholar
L. Kohout and E. Kim, Characterization of interval fuzzy logic systems of connectives by group transformations, Reliab. Comput. 10 (2004), no. 4, 299–334.
Google Scholar
A.G. Konheim, Computer Security and Cryptography, John Wiley & Sons, Inc., Hoboken, 2007.
Google Scholar
M. Maeda, M. Suenaga, and H. Miyajima, Qubit neuron according to quantum circuit for XOR problem, Appl. Math. Comput. 185 (2007), no. 2, 1015–1025.
Google Scholar
C.F. Mela and D.R. Lehmann, Using fuzzy set theoretic techniques to identify preference rules from interactions in the linear model: an empirical study, Fuzzy Sets and Systems 71 (1995), no. 2, 165–181.
Google Scholar
N.D. Mermin, Quantum Computer Science. An Introduction, Cambridge University Press, Cambridge, 2007.
Google Scholar
W. Pedrycz and G. Succi, fXOR fuzzy logic networks, Soft Comput. 7 (2002), no. 2, 115–120.
Google Scholar
C. Shannon, Communication theory of secrecy systems, Bell System Tech. J. 28 (1949), 656–715.
Google Scholar
W. Stallings, Cryptography and Network Security. Principles and Practice, Prentice Hall, Upper Saddle River, 1999.
Google Scholar
H. Vandierendonck and K. De Bosschere, XOR-based hash functions, IEEE Trans. Comput. 54 (2005), no. 7, 800–812.
Google Scholar
H. Vandierendonck, P. Manet, and J.-D. Legat, Application-specific reconfigurable XOR-indexing to eliminate cache conflict misses, in: Proceedings of the Design Automation & Test in Europe Conference, IEEE, 2006, pp. 357–362.
Google Scholar