Search results for: Pierre-Alain Fouque
Journal of Cryptology > 2018 > 31 > 3 > 845-884
Lecture Notes in Computer Science
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Attacks on Asymmetric Cryptosystems > 254-268
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Public Key Cryptography II > 492-506
Lecture Notes in Computer Science > Progress in Cryptology – LATINCRYPT 2010 > Elliptic Curves > 81-91
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2006 > Authentication and Key Establishment > 410-426
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2009 > Side Channel Analysis of Secret Key Cryptosystems > 66-80
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2005 > Key Agreement > 566-584
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2001 > Threshold Cryptography > 310-330
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Side Channels III > 312-327
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Attacks on Asymmetric Cryptosystems > 269-280
Lecture Notes in Computer Science > Security and Cryptography for Networks > Public Key Related Cryptanalysis > 348-359