Search results for: Jean-Jacques Quisquater
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2001 > Flaws and Attacks > 208-222
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Arithmetic Architectures > 293-301
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’87 > Public Key Systems > 223-223
Lecture Notes in Computer Science > Smart Card Programming and Security > Contributed Papers > 200-210
Lecture Notes in Computer Science > Stabilization, Safety, and Security of Distributed Systems > 1-1
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 89 Proceedings > Fast computation > 408-413
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Special Purpose Hardware for Cryptanalysis > 378-393
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2001 > Side Channel Attacks on Elliptic Curve Cryptosystems > 402-410
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2004 > Digital Signatures > 112-125
Lecture Notes in Computer Science > Fast Software Encryption > Block Cipher Cryptanalysis (II) > 382-397
Lecture Notes in Computer Science > Security in Communication Networks > Public Key Cryptosystems > 220-234
Lecture Notes in Computer Science > Advances in Cryptology > Cryptosystems and Other Hard Problems > 144-146
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2007 > Cryptanalysis – II > 77-88