Search results for: Bogdan Warinschi
Designs, Codes and Cryptography > 2018 > 86 > 11 > 2549-2586
2017 IEEE Symposium on Security and Privacy (SP) > 993 - 1008
IET Information Security > 2016 > 10 > 6 > 319 - 331
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2007 > Protocol Analysis > 482-499
Lecture Notes in Computer Science > Computer Security – ESORICS 2007 > Applied Cryptography III > 406-421
2016 IEEE Symposium on Security and Privacy (SP) > 452 - 469
Lecture Notes in Computer Science > Foundations of Software Science and Computation Structures > Security > 398-412
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Asymmetric Encryption and Anonymity > 179-197
Lecture Notes in Computer Science > Security and Cryptography for Networks > Groups Signatures and Authentication > 381-398
Lecture Notes in Computer Science > Computer Security – ESORICS 2007 > Applied Cryptography III > 422-437
Lecture Notes in Computer Science > Security and Cryptography for Networks > Groups Signatures and Authentication > 363-380
Lecture Notes in Computer Science > FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science > Contributed Papers – Track A > 176-187
Lecture Notes in Computer Science > Public Key Cryptography – PKC 2007 > Public-Key Infrastructure > 458-475
Lecture Notes in Computer Science > Automata, Languages and Programming > Security Protocols Logic > 664-676
Lecture Notes in Computer Science > Cryptography and Coding > Side Channels and Implementations > 469-494