Search results for: Svetla Nikova
Cryptography and Communications > 2019 > 11 > 3 > 385-398
Cryptography and Communications > 2019 > 11 > 3 > 379-384
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2017 > 25 > 12 > 3291 - 3301
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2002 > Secret Sharing and Oblivious Transfer > 422-435
Lecture Notes in Computer Science > Algebraic Coding > 207-216
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Side Channel Attack > 218-234
Lecture Notes in Computer Science > Security in Communication Networks > Distributed Cryptography > 249-262
Lecture Notes in Computer Science > Security and Cryptography for Networks > Session 7: Hardware and Cryptanalysis > 236-245
Lecture Notes in Computer Science > Cryptography and Coding > Applications of Coding in Cryptography > 82-92
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptographic Applications > 1-15
Lecture Notes in Computer Science > Selected Areas in Cryptography > Cryptographic Protocols > 308-325
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Cryptographic Boolean Functions > 120-135
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2009 > Hash Functions > 182-198
Lecture Notes in Computer Science > Information and Communications Security > Security Implementations > 529-545
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2003 > Secrect Sharing > 135-147
Lecture Notes in Computer Science > Automata, Languages and Programming > Security Mechanisms > 324-334
Lecture Notes in Computer Science > Information Security Applications > Anonymity/Authentication/Access Control > 309-323