Search results for: F. Brickell
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 89 Proceedings > Fast computation > 368-370
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 86 > Data Encryption Standard > 3-8
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’85 Proceedings > Signatures and authentication > 28-32
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT’ 92 > Public Key II > 200-207
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’88 > Cryptanalysis > 275-280
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’89 > Cryptanalysis > 403-411
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’89 > Sharing and authentication schemes > 468-475
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 89 Proceedings > Threshold schemes and Key management > 278-285
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT’ 87 > Public Key Topics > 117-125
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 88 > Short Rump Session Presentations > 564-577
Lecture Notes in Computer Science
AT&T Technical Journal > 1991 > 70 > 6 > 73 - 86
IEE Proceedings H Microwaves, Antennas and Propagation > 1986 > 133 > 2 > 122 - 126