Search results for: Guillaume Poupard
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2000 > Key Management Protocols > 172-189
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Short Papers > 171-176
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2003 > Attacks on Asymmetric Cryptosystems > 254-268
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Public Key Cryptography II > 492-506
Lecture Notes in Computer Science > Smart Card Research and Applications > Session 7: Advanced Encryption Standard > 254-264
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Arithmetic for Cryptanalysis > 47-60
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Side Channels III > 312-327
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT’98 > Public Key Cryptosystems > 11-24
Lecture Notes in Computer Science > Financial Cryptography > Financial Cryptography Tools (I) > 90-104
Lecture Notes in Computer Science > Selected Areas in Cryptography > Secret Key Cryptography I > 212-226
Lecture Notes in Computer Science > Fast Software Encryption > MACs > 170-181
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2003 > Cryptanalysis III > 462-476
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2006 > Cryptanalysis and Protocol Weaknesses > 27-43
Journal of Cryptology > 2006 > 19 > 4 > 463-487
Designs, Codes and Cryptography > 2003 > 28 > 1 > 5-31