Search results for: Chik How Tan
Designs, Codes and Cryptography > 2019 > 87 > 12 > 2979-2999
Applicable Algebra in Engineering, Communication and Computing > 2019 > 30 > 2 > 107-125
Designs, Codes and Cryptography > 2018 > 86 > 1 > 151-159
Discrete Applied Mathematics > 2016 > 215 > C > 197-202
Discrete Applied Mathematics > 2016 > 211 > C > 217-221
Finite Fields and Their Applications > 2016 > 40 > C > 73-89
Lecture Notes in Computer Science > Cryptography and Coding > Pairing and ECC Implementation > 327-343
Lecture Notes in Computer Science > Advances in Information and Computer Security > Encryption and Key Exchange > 292-307
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Public-Key Cryptography > 119-131
Lecture Notes in Computer Science > Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues > ASIAN’2006 > 37-44
Lecture Notes in Computer Science > Cryptology and Network Security > Cryptographic Protocols > 261-277
Lecture Notes in Computer Science > Advances in Information and Computer Security > Signature and Signcryption > 64-82
Lecture Notes in Computer Science > Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication > Hardware Implementation > 175-190
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops > 450-459
Information Processing Letters > 2016 > 116 > 2 > 116-119
Cryptography and Communications > 2017 > 9 > 3 > 363-378
Science China Mathematics > 2016 > 59 > 6 > 1221-1234
Applicable Algebra in Engineering, Communication and Computing > 2016 > 27 > 3 > 205-217