Search results for: Kazuo Ohta
IEEE Transactions on Information Theory > 2018 > 64 > 1 > 654 - 685
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > Fault Attacks > 292-311
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2008 > Hash Function Cryptanalysis > 1-18
Security and Communication Networks > 9 > 12 > 1663 - 1675
Theoretical Computer Science > 2016 > 630 > C > 95-116
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems, CHES 2010 > Fault Attacks and Countermeasures > 320-334
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 89 Proceedings > Odds and ends > 481-496
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’87 > Key Distribution Systems > 175-184
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 93 > Differential Cryptanalysis > 200-211
Lecture Notes in Computer Science > Selected Areas in Cryptography > Design and Implementation of Secret Key Cryptosystems > 264-279
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2008 > Hash Functions > 290-307
Lecture Notes in Computer Science > Fast Software Encryption > Cryptanalysis of Hash Functions (II) > 329-348
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2006 > Attacks on Hash Functions > 21-36
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Hash Functions > 243-259