Search results for: Rainer Steinwandt
International Journal of Applied Mathematics and Computer Science > 2019 > Vol. 29, no. 4 > 797--815
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 6 > 1093 - 1105
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2007 > Cryptanalysis – I > 1-10
Lecture Notes in Computer Science > Public Key Cryptography — PKC 2003 > Implementation and Hardware Issues > 254-266
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Key Agreement and Threshold Cryptography > 298-311
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Digital Signature > 182-194
Lecture Notes in Computer Science > SOFSEM 2005: Theory and Practice of Computer Science > Full Contributed Papers > 288-297
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2011 > Cryptographic Primitives > 65-76
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Hardware Factorization > 51-61
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Special Purpose Hardware > 131-146