Wyniki wyszukiwania dla: Mehdi Tibouchi
Journal of Cryptology > 2019 > 32 > 3 > 973-1025
IET Information Security > 2016 > 10 > 6 > 358 - 371
Designs, Codes and Cryptography > 2017 > 82 > 1-2 > 161-177
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2009 > Attacks on Signature Schemes > 428-444
Lecture Notes in Computer Science > Topics in Cryptology - CT-RSA 2010 > Side-Channel Attacks > 208-220
Lecture Notes in Computer Science > Progress in Cryptology – LATINCRYPT 2010 > Elliptic Curves > 81-91
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Public Key Cryptography > 65-72
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Public-Key Encryption > 487-504
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2010 > Theory and Applications > 237-254
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Public Key Encryption > 1-18
Lecture Notes in Computer Science > Pairing-Based Cryptography - Pairing 2010 > Point Encoding and Pairing-Friendly Curves > 265-277
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > Lattices > 192-206
Journal of Cryptology > 2016 > 29 > 3 > 632-656
Journal of Cryptology > 2016 > 29 > 3 > 597-631
Journal of Cryptographic Engineering > 2013 > 3 > 1 > 59-72
Journal of Cryptology > 2013 > 26 > 2 > 246-250
IEEE Security & Privacy > 2011 > 9 > 2 > 75 - 78
Journal of Cryptographic Engineering > 2011 > 1 > 3 > 243-253