12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers
Lecture Notes in Computer Science > Selected Areas in Cryptography > Efficient Implementations > 307-318
Lecture Notes in Computer Science > Selected Areas in Cryptography > Efficient Implementations > 319-331
Lecture Notes in Computer Science > Selected Areas in Cryptography > Efficient Implementations > 332-344
Lecture Notes in Computer Science > Selected Areas in Cryptography > Efficient Implementations > 345-358
Lecture Notes in Computer Science > Selected Areas in Cryptography > Efficient Implementations > 359-369
Lecture Notes in Computer Science > Selected Areas in Cryptography > Key Establishment Protocols and Access Control > 189-204
Lecture Notes in Computer Science > Selected Areas in Cryptography > Key Establishment Protocols and Access Control > 205-220
Lecture Notes in Computer Science > Selected Areas in Cryptography > Key Establishment Protocols and Access Control > 221-232
Lecture Notes in Computer Science > Selected Areas in Cryptography > Protocols for RFID Tags > 276-290
Lecture Notes in Computer Science > Selected Areas in Cryptography > Protocols for RFID Tags > 291-306
Lecture Notes in Computer Science > Selected Areas in Cryptography > Public Key Cryptography > 128-143
Lecture Notes in Computer Science > Selected Areas in Cryptography > Public Key Cryptography > 144-158