Search results for: Katsuyuki Okeya
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2003 > Implementation & Digital Watermarking > 334-348
Lecture Notes in Computer Science > Information Security and Privacy > Hashing and Message Authentication > 432-443
Lecture Notes in Computer Science > Selected Areas in Cryptography > Efficient Implementations I > 188-202
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 245-258
Lecture Notes in Computer Science > Cryptology and Network Security > Cryptographic Algorithms and Protocols > 226-239
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2002 > Elliptic Curve Cryptography III > 564-578
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Countermeasures to Side Channel Leakage > 397-410
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security of Limited Devices > 268-283
Lecture Notes in Computer Science > Information Security and Privacy > Side Channel Attacks > 218-229
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2009 > Effciency Improvements > 340-356
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 230-244
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Efficient Algorithms for Embedded Processors > 148-165
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2004 > Efficient Representations > 123-139
Lecture Notes in Computer Science > Information and Communications Security > Side Channel Analysis > 111-127
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Side Channels and Protocol Analysis > 398-413
Lecture Notes in Computer Science > Progress in Cryptology – INDOCRYPT 2007 > Short Presentation > 393-403