Search for persons
X
?
Information Security Applications; Lecture Notes in Computer Science ,
10
Impact of Optimized Operations $$A\cdot B$$, $$A\cdot C$$ f..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
11
Compact Implementation of CHAM Block Cipher on Low-End Micr..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
12