Search results for: Wenling Wu
Designs, Codes and Cryptography > 2018 > 86 > 4 > 721-741
Lecture Notes in Computer Science > Fast Software Encryption > Message Authentication Codes > 250-269
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography and Coding > 62-67
Lecture Notes in Computer Science > Information Security Practice and Experience > Block Ciphers and MACs > 233-246
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Hash and MAC > 286-301
Lecture Notes in Computer Science > Computational Intelligence and Security > Security Models and Architecture > 375-380
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Block/Stream Ciphers (I) > 229-241
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Cryptanalysis of Hash Function > 300-314
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 7: Encryption > 327-344
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptanalysis > 324-335
Lecture Notes in Computer Science > Information Security and Cryptology > Symmetric Key Mechanisms > 175-188
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptanalysis > 336-344