Search results for: Francois Koeune
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Side-Channel Attacks > 485-498
Lecture Notes in Computer Science > Smart Card Research and Applications > Session 4: Attacks and Dealing with Speci c Threats > 167-182
Lecture Notes in Computer Science > Information Hiding > Watermarking and Software Protection > 368-378
Lecture Notes in Computer Science > Foundations of Security Analysis and Design III > FOSAD 2004 (6-11 September 2004) > 78-108
Lecture Notes in Computer Science > Field-Programmable Logic and Applications: Reconfigurable Computing Is Going Mainstream > Crypto Applications 2 > 845-852
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Privacy and Digital Rights > 98-115
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Digital Signatures > 90-96
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Attacks on Asymmetric Cryptosystems > 291-303
Computer Networks > 2011 > 55 > 7 > 1614-1630