Search results for: Kazuo Ohta
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2011 > Fault Attacks > 292-311
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2008 > Hash Function Cryptanalysis > 1-18
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems, CHES 2010 > Fault Attacks and Countermeasures > 320-334
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 89 Proceedings > Odds and ends > 481-496
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’87 > Key Distribution Systems > 175-184
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 93 > Differential Cryptanalysis > 200-211
Lecture Notes in Computer Science > Selected Areas in Cryptography > Design and Implementation of Secret Key Cryptosystems > 264-279
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2008 > Hash Functions > 290-307
Lecture Notes in Computer Science > Fast Software Encryption > Cryptanalysis of Hash Functions (II) > 329-348
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2006 > Attacks on Hash Functions > 21-36
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Hash Functions > 243-259
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Provable Security and Primitives > 129-145
Lecture Notes in Computer Science > Progress in Cryptology – Mycrypt 2005 > Cryptographic Protocols > 132-150