Journal of Cryptographic Engineering
Journal of Cryptographic Engineering > 2013 > 3 > 1 > 45-58
Journal of Cryptographic Engineering > 2013 > 3 > 1 > 29-43
Journal of Cryptographic Engineering > 2013 > 3 > 1 > 17-28
Journal of Cryptographic Engineering > 2013 > 3 > 1 > 59-72
Journal of Cryptographic Engineering > 2013 > 3 > 1 > 3-15
Journal of Cryptographic Engineering > 2013 > 3 > 2 > 73-97
Journal of Cryptographic Engineering > 2013 > 3 > 2 > 129-138
Journal of Cryptographic Engineering > 2013 > 3 > 2 > 111-128
Journal of Cryptographic Engineering > 2013 > 3 > 2 > 99-110
Journal of Cryptographic Engineering > 2013 > 3 > 3 > 157-167
Journal of Cryptographic Engineering > 2013 > 3 > 3 > 139-156
Journal of Cryptographic Engineering > 2013 > 3 > 3 > 169-180
Journal of Cryptographic Engineering > 2013 > 3 > 3 > 181-195
Journal of Cryptographic Engineering > 2013 > 3 > 4 > 213-225
Journal of Cryptographic Engineering > 2013 > 3 > 4 > 241-265
Journal of Cryptographic Engineering > 2013 > 3 > 4 > 227-240
Journal of Cryptographic Engineering > 2013 > 3 > 4 > 197-211