Search results for: Charanjit S. Jutla
Journal of Cryptology > 2017 > 30 > 4 > 1116-1156
Lecture Notes in Computer Science > Theory of Cryptography > Pseudo-Random Functions and Encryption > 561-580
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2001 > Arithmetic Architectures > 171-184
Lecture Notes in Computer Science > Selected Areas in Cryptography > Efficient Implementation > 348-360
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2001 > Authentication and Identification > 529-544
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 99 > Differential Power Analysis > 398-412
Journal of Cryptology > 2008 > 21 > 4 > 547-578
Theoretical Computer Science > 2001 > 258 > 1-2 > 491-522
Information and Computation > 1997 > 133 > 2 > 117-134