Search results for: Jean-Philippe Aumasson
Computer Fraud & Security > 2017 > 2017 > 6 > 8-11
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2008 > Hash Functions > 308-324
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2007 > Hash Functions – II > 309-323
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems, CHES 2010 > Low Cost Cryptography > 1-15
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Hash Functions > 14-28
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2008 > Cryptographic Hash Functions > 67-77
Lecture Notes in Computer Science > Fast Software Encryption > Stream Cipher Cryptanalysis (II) > 470-488
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 184-199
Lecture Notes in Computer Science > Fast Software Encryption > Hash Functions III (Short Presentation) > 318-332
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2009 > Hash Functions III > 542-559
Lecture Notes in Computer Science > Selected Areas in Cryptography > Hash Functions and Stream Ciphers > 415-432
Lecture Notes in Computer Science > Information and Communications Security > Cryptographic Protocols > 78-92
Lecture Notes in Computer Science > Progress in Cryptology – INDOCRYPT 2011 > Secret-Key Cryptography, Part 1 > 134-145