Search results for: Thomas Peyrin
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems, CHES 2010 > Side-Channel Attacks and Countermeasures I > 140-157
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Efficient Representations > 260-274
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > Lightweight Symmetric Algorithms > 326-341
IFIP — The International Federation for Information Processing > Security and Privacy in the Age of Ubiquitous Computing > Regular Papers > 251-265
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Hash Functions > 354-368
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Symmetric Cryptanalysis and Constructions > 222-239
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2006 > Construction of Hash Function > 315-331
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2010 > Key Exchange > 250-267
Lecture Notes in Computer Science > Fast Software Encryption > Theory > 119-136
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2008 > Cryptographic Hash Functions I > 143-160