Search results for: Jongin Lim
Pattern Recognition Letters > 2017 > 88 > C > 57-63
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 41-48
The Journal of Supercomputing > 2017 > 73 > 3 > 1140-1151
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Information Security and Hiding (ISH 2005) Workshop > 537-546
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis & Cryptographic Techniques > 456-468
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Block Ciphers > 175-190
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2001 > Block Ciphers > 208-221
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Steganography > 440-454
Lecture Notes in Computer Science > Selected Areas in Cryptography > RSA and XTR Enhancements > 369-384
Lecture Notes in Computer Science > Information Security Practice and Experience > Cryptoanalysis > 33-44