Search results for: Thomas Plantard
Journal of Cryptographic Engineering > 2019 > 9 > 2 > 115-136
Lecture Notes in Computer Science > Information Security Practice and Experience > Post-quantum Cryptography and Side-Channel Attack > 152-167
Journal of Cryptographic Engineering > 2017 > 7 > 3 > 245-253
Lecture Notes in Computer Science > Security and Cryptography for Networks > Lattice-Based Cryptography > 329-344
Lecture Notes in Computer Science > Selected Areas in Cryptography > Efficient Implementations > 159-169
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2008 > Session VI: Digital Signatures (II) > 288-307
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering > Quantum Communication and Quantum Networking > Workshop on Quantum and Classical Information Security > 275-282
IET Information Security > 2016 > 10 > 1 > 1 - 7
International Journal of Information Security > 2016 > 15 > 3 > 271-283
2015 IEEE 22nd Symposium on Computer Arithmetic > 144 - 151
2015 IEEE 22nd Symposium on Computer Arithmetic > 113 - 120
Theoretical Computer Science > 2015 > 580 > Complete > 1-13
Designs, Codes and Cryptography > 2015 > 76 > 2 > 325-344
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 12 > 2127 - 2137