Search results for: Aaram Yun
Fundamenta Informaticae > 2022 > Vol. 188 nr 2 > 91--101
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2006 > Hash Functions – II > 286-295
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Provable Security and Primitives > 146-155
Information Sciences > 2015 > 310 > Complete > 149-162
Journal of Cryptology > 2012 > 25 > 2 > 271-309
Designs, Codes and Cryptography > 2011 > 58 > 1 > 45-72
IEEE Transactions on Computers > 2010 > 59 > 9 > 1295 - 1296