Search results for: Masaaki Shirase
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Efficient Implementation > 420-431
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptographic Algorithms and Implementations > 254-268
Lecture Notes in Computer Science > Information Security and Cryptology > Wireless Network Security > 289-304
Lecture Notes in Computer Science > Information Security Practice and Experience > Applied Cryptography > 112-123
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2010 > Discrete Logarithm > 351-367
Lecture Notes in Computer Science > Selected Areas in Cryptography > Implementation of Public Key Cryptography > 364-375
Lecture Notes in Computer Science > Information Security and Cryptology > Digital Signature and Signcryption Schemes > 47-59
Lecture Notes in Computer Science > Arithmetic of Finite Fields > Efficient Implementation and Architectures > 25-39
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications > 1-15
Mathematical and Computer Modelling > 2013 > 57 > 3-4 > 324-343
Computers and Electrical Engineering > 2010 > 36 > 1 > 73-87
Science China Information Sciences > 2010 > 53 > 10 > 2016-2021