Search results for: Daniel J. Bernstein
Lecture Notes in Computer Science > Fast Software Encryption > Stream Cipher Cryptanalysis (II) > 290-308
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Multivariate and Coding-Based Schemes > 743-760
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2008 > Implementation > 389-405
Lecture Notes in Computer Science > Progress in Cryptology – LATINCRYPT 2010 > Elliptic Curves > 61-80
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2011 > Secret-Key Cryptography > 134-152
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2009 > Post-Quantum Cryptology > 18-38
Lecture Notes in Computer Science > Progress in Cryptology – INDOCRYPT 2007 > Elliptic Curve Cryptography > 167-182
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2010 > Efficient Implementation > 328-346
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Regular Contributions > 291-300
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2007 > Number Theory and Elliptic Curve > 29-50