Search for persons
X
?
Information Security and Cryptology – ICISC 2020; Lecture Notes in Computer Science ,
1
Can a Differential Attack Work for an Arbitrarily Large Num..:
, In:
?
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security ,
2
Authenticated wireless roaming via tunnels : making mobi..:
, In:
?
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems; Lecture Notes in Computer Science ,
3
Fault Attacks for CRT Based RSA: New Attacks, New Results, ..:
, In:
?
Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems ,
4
Fault attacks for CRT based RSA : new attacks, new resul..:
, In:
?
Proceedings of the 14th ACM conference on Computer and communications security ,
5
Forward-secure signatures in untrusted update environments ..:
, In:
?
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks ,
6
Authentication protocols for ad hoc networks : taxonomy ..:
, In:
?
Proceedings of the twenty-second annual symposium on Principles of distributed computing ,
7
Efficient revocation and threshold pairing based cryptosyst..:
, In:
?
Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays ,
8
Design strategies and modified descriptions to optimize cip..:
, In:
?
Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays ,
9
A methodology to implement block ciphers in reconfigurable ..:
, In:
?
Proceedings of the conference on Design, Automation and Test in Europe - Volume 1 ,
10
Securing Mobile Appliances : New Challenges for the Syst..:
, In:
?
Proceedings of the 8th ACM conference on Computer and Communications Security ,
11
Provably authenticated group Diffie-Hellman key exchange:
, In:
?
Proceedings of the 4th ACM conference on Computer and communications security ,
12