Search results for: Chae Hoon Lim
Lecture Notes in Computer Science > Security Protocols > 131-138
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’94 > Implementation and Hardware Aspects > 95-107
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC’99 > Cryptographic Theory and Computation Complexity > 102-119
Lecture Notes in Computer Science > Information and Communications Security > Security Protocols > 1-20
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems > Hardware Architectures > 49-60
Lecture Notes in Computer Science > Information Security Applications > Efficient HW Implementation > 243-258
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT’98 > Cryptanlysis 2 > 214-226
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Theoretical Computer Science > 2011 > 412 > 35 > 4729-4737