Search results for: Dong-Guk Han
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2003 > Implementation & Digital Watermarking > 334-348
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Efficient Implementation > 420-431
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Applied Cryptography and Information Security (ACIS 2006) > 375-384
Lecture Notes in Computer Science > Selected Areas in Cryptography > RSA and XTR Enhancements > 369-384
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptoanalysis > 33-44
Lecture Notes in Computer Science > Information Security and Privacy > Dealing with Adversaries > 464-481
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing – EUC 2005 Workshops > The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) > 864-873
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Side Channels and Protocol Analysis > 398-413
Lecture Notes in Computer Science > Information Security and Privacy > Cryptanalysis (III) > 454-465
Lecture Notes in Computer Science > Smart Card Research and Advanced Applications > Side Channel Attacks > 119-134
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptographic Algorithms and Implementations > 238-253
Lecture Notes in Computer Science > Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems > Hardware and Cryptography I > 39-52