Search results for: Gregory Neven
Journal of Cryptology > 2018 > 31 > 2 > 307-350
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2004 > Signatures II > 268-286
Lecture Notes in Computer Science > Information and Communications Security > Session 1A. Access Control > 16-30
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2006 > Message Authentication > 262-279
Lecture Notes in Computer Science > Security and Cryptography for Networks > Groups Signatures and Authentication > 381-398
Lecture Notes in Computer Science > Computer Security – ESORICS 2007 > Applied Cryptography I > 139-154
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 274-292
Lecture Notes in Computer Science > Automata, Languages and Programming > Multi-party Protocols > 300-311
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2007 > Digital Signatures (I) > 145-162