Search results for: Martijn Stam
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Public Key Encryption II > 161-178
Lecture Notes in Computer Science > Cryptography and Coding > Public Key and ID-Based Encryption Schemes > 410-427
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > Hash Functions > 507-522
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Hash Function > 233-251
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Symmetric Schemes > 561-577
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2011 > Proofs of Security > 213-236
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2001 > Practical Public Key Cryptography > 125-143
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2008 > Hash Functions II > 397-412
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2005 > Algebra and Number Theory I > 234-250
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Hash Functions > 229-242