Cryptography and Communications
Cryptography and Communications > 2009 > 1 > 1 > 31-46
Cryptography and Communications > 2009 > 1 > 1 > 71-94
Cryptography and Communications > 2009 > 1 > 1 > 3-29
Cryptography and Communications > 2009 > 1 > 1 > 95-116
Cryptography and Communications > 2009 > 1 > 1 > 117-133
Cryptography and Communications > 2009 > 1 > 1 > 47-69
Cryptography and Communications > 2009 > 1 > 2 > 175-205
Cryptography and Communications > 2009 > 1 > 2 > 207-223
Cryptography and Communications > 2009 > 1 > 2 > 135-173
Cryptography and Communications > 2009 > 1 > 2 > 225-268
Cryptography and Communications > 2009 > 1 > 2 > 269-282
Cryptography and Communications > 2010 > 2 > 1 > 41-47
Cryptography and Communications > 2010 > 2 > 1 > 1-17
Cryptography and Communications > 2010 > 2 > 1 > 111-126
Cryptography and Communications > 2010 > 2 > 1 > 19-40
Cryptography and Communications > 2010 > 2 > 1 > 85-109
Cryptography and Communications > 2010 > 2 > 1 > 69-83
Cryptography and Communications > 2010 > 2 > 1 > 49-67
Cryptography and Communications > 2010 > 2 > 2 > 293-306