Search results for: Mario Lamberger
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Hash Function > 270-287
Lecture Notes in Computer Science > Selected Areas in Cryptography > Coding and Combinatorics > 187-197
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Obfuscated Code Detection > 19-31
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2009 > Hash Functions I > 126-143
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2002 > Efficient Hardware Implementations > 67-78
Journal of Cryptology > 2015 > 28 > 2 > 257-296
Information Processing Letters > 2013 > 113 > 3 > 60-66
Designs, Codes and Cryptography > 2012 > 62 > 1 > 1-18
Indagationes Mathematicae > 2006 > 17 > 1 > 45-63