Search results for: Khoongming Khoo
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Applied Cryptography and Information Security (ACIS 2006) > 416-425
Lecture Notes in Computer Science > Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems > Cryptography Scheme > 80-89
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2010 > Ciphers and Hash Functions > 387-406
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptanalysis > 194-209
Lecture Notes in Computer Science > Information Security > Symmetric Cryptography and Hash Functions > 367-384
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2007 > Cryptanalysis – II > 116-130
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 157-173
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Hardware Implementation > 175-190
Lecture Notes in Computer Science > Information Security and Privacy > Theory and Hash Functions > 498-509
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2009 > General Track on Information Systems and Information Technologies > 863-876
Lecture Notes in Computer Science > Information Security and Privacy > Symmetric Key Encryption > 73-89
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Security and Cryptography > 191-207
Journal of Cryptology > 2011 > 24 > 2 > 322-345