Search results for: Vincent Rijmen
Cryptography and Communications > 2019 > 11 > 3 > 385-398
Information Processing Letters > 2018 > 138 > C > 27-30
Cryptography and Communications > 2019 > 11 > 3 > 379-384
Designs, Codes and Cryptography > 2018 > 86 > 11 > 2469-2484
Science China Information Sciences > 2018 > 61 > 3 > 1-13
IET Information Security > 2017 > 11 > 4 > 177 - 187
Lecture Notes in Computer Science > Information Security Applications > Applied Cryptography > 458-473
Lecture Notes in Computer Science
Designs, Codes and Cryptography > 2017 > 83 > 2 > 327-343
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2007 > Hash Functions – II > 324-334
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Side Channel Attack > 218-234
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2007 > Hash Functions – II > 335-345
Lecture Notes in Computer Science > Information Security Applications > Public Key Schemes I > 65-72
Lecture Notes in Computer Science > Security and Cryptography for Networks > Session 7: Hardware and Cryptanalysis > 236-245
Lecture Notes in Computer Science > Selected Areas in Cryptography > Coding and Combinatorics > 187-197