Search results for: Paul C. Oorschot
Lecture Notes in Computer Science > Selected Areas in Cryptography > Block Cipher Security > 250-270
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Threat and Attacks > 31-43
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Authentication and Fraud Detection > 20-35
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’96 > Cryptanalysis I > 19-32
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’90 > Cryptanalysis > 318-325
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’96 > Key Management and Identification Schemes > 332-343
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’96 > Symmetric Systems > 229-236
Lecture Notes in Computer Science > Advances in Cryptology-CRYPT0’ 90 > Design and Analysis II > 577-581
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Internet Security > 103-119
International Journal of Information Security > 2006 > 5 > 3 > 186-199
Journal of Cryptology > 1999 > 12 > 1 > 1-28