Journal of Cryptographic Engineering
Journal of Cryptographic Engineering > 2015 > 5 > 1 > 53-69
Journal of Cryptographic Engineering > 2015 > 5 > 1 > 31-52
Journal of Cryptographic Engineering > 2015 > 5 > 1 > 1-11
Journal of Cryptographic Engineering > 2015 > 5 > 1 > 13-29
Journal of Cryptographic Engineering > 2015 > 5 > 2 > 73-83
Journal of Cryptographic Engineering > 2015 > 5 > 2 > 123-139
Journal of Cryptographic Engineering > 2015 > 5 > 2 > 141-151
Journal of Cryptographic Engineering > 2015 > 5 > 2 > 95-112
Journal of Cryptographic Engineering > 2015 > 5 > 2 > 85-94
Journal of Cryptographic Engineering > 2015 > 5 > 2 > 113-122
Journal of Cryptographic Engineering > 2015 > 5 > 3 > 171-185
Journal of Cryptographic Engineering > 2015 > 5 > 3 > 187-199
Journal of Cryptographic Engineering > 2015 > 5 > 3 > 201-214
Journal of Cryptographic Engineering > 2015 > 5 > 3 > 215-226
Journal of Cryptographic Engineering > 2015 > 5 > 3 > 153-169
Journal of Cryptographic Engineering > 2015 > 5 > 4 > 227-243
Journal of Cryptographic Engineering > 2015 > 5 > 4 > 255-267
Journal of Cryptographic Engineering > 2015 > 5 > 4 > 245-254
Journal of Cryptographic Engineering > 2015 > 5 > 4 > 269-288