Search for persons
X
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
3
SoK: Secure Memory Allocation:
, In:
?
Proceedings of the First Workshop on Cryptography and Security in Computing Systems ,
8
On using genetic algorithms for intrinsic side-channel resi..:
, In:
?
Proceedings of the 15th annual conference companion on Genetic and evolutionary computation ,
10
Evolving cryptographically sound boolean functions:
, In:
?
2007 29th International Conference on Information Technology Interfaces ,
12