Search results for: David Pointcheval
Journal of Cryptology > 2019 > 32 > 1 > 84-150
IET Information Security > 2016 > 10 > 6 > 332 - 347
IET Information Security > 2016 > 10 > 6 > 288 - 303
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2001 > Reductions, Constructions and Security Proofs > 159-174
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2001 > Gambling and Lotteries > 110-125
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2000 > Key Management Protocols > 139-155
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2003 > Public Key Cryptanalysis II > 226-246
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Authentication and Signatures > 441-454
Lecture Notes in Computer Science > Financial Cryptography and Data Security > User Authentication > 341-356
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2002 > Foundations and Methodology > 93-110
Lecture Notes in Computer Science
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT’99 > Public Key Cryptosystems > 165-179
Lecture Notes in Computer Science > Security and Cryptography for Networks > Public Key Encryption and Key Exchange > 186-200
Lecture Notes in Computer Science > Security and Cryptography for Networks > Session 6: Signatures > 201-217
Lecture Notes in Computer Science > Selected Areas in Cryptography > Secret Key Cryptography I > 182-197