Search results for: Camille Vuillaume
Lecture Notes in Computer Science > Selected Areas in Cryptography > Efficient Implementations I > 188-202
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Security of Limited Devices > 268-283
Lecture Notes in Computer Science > Information Security and Privacy > Side Channel Attacks > 218-229
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2009 > Effciency Improvements > 340-356
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 230-244
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications > 84-98
Lecture Notes in Computer Science > Information Security and Privacy > Cryptanalysis (III) > 466-477
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Signature Schemes I > 31-45
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Low Resources > 91-105
International Journal of Information Security > 2009 > 8 > 1 > 13-23