Search results for: Tetsu Iwata
International Journal of Information Security > 2018 > 17 > 5 > 493-511
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT’99 > Asymmetric Key Cryptosystems > 20-28
Lecture Notes in Computer Science > Fast Software Encryption > Fast Talks: Block Cipher Design > 181-195
Lecture Notes in Computer Science > Information Security and Cryptology — ICISC 2002 > Stream Ciphers & Other Primitives > 226-237
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Primitives > 67-78
Lecture Notes in Computer Science > Fast Software Encryption > MACs > 129-153
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2008 > Authentication > 125-142
Lecture Notes in Computer Science > Selected Areas in Cryptography > Mathematical Aspects of Applied Cryptography II > 373-386