Search results for: Elisavet Konstantinou
Lecture Notes in Computer Science > Trust, Privacy and Security in Digital Business > Security and Privacy in Real Life Applications > 52-62
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2003 > Elliptic Curve & Algebraic Geometry > 309-322
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Elliptic Curve Cryptography II > 333-348
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Elliptic Curve Cryptosystem > 261-278
Finite Fields and Their Applications > 2012 > 18 > 6 > 1232-1241
Computers & Security > 2011 > 30 > 8 > 643-678
IEEE Communications Surveys & Tutorials > 2011 > 13 > 3 > 429 - 442
Journal of Network and Computer Applications > 2011 > 34 > 1 > 384-393
Computers and Mathematics with Applications > 2010 > 60 > 2 > 217-223
Computers and Mathematics with Applications > 2010 > 59 > 8 > 2901-2917
Journal of Cryptology > 2010 > 23 > 3 > 477-503
Journal of Network and Computer Applications > 2010 > 33 > 1 > 16-28
Electronic Notes in Theoretical Computer Science > 2007 > 171 > 1 > 17-31