Search results for: Michel Abdalla
Journal of Cryptology > 2019 > 32 > 1 > 84-150
Journal of Cryptology > 2018 > 31 > 4 > 917-964
Journal of Cryptology > 2018 > 31 > 2 > 307-350
IET Information Security > 2016 > 10 > 6 > 288 - 303
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2001 > Reductions, Constructions and Security Proofs > 143-158
Lecture Notes in Computer Science > Financial Cryptography and Data Security > User Authentication > 341-356
Lecture Notes in Computer Science
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2006 > Message Authentication > 262-279
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Symmetric-Key Schemes II > 546-559
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Key Agreement Protocols > 254-271
Lecture Notes in Computer Science > Cryptology and Network Security > Identification, Authentication and Key Management > 133-148
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2005 > Key Agreement > 566-584