Search results
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2008 > Public-Key Cryptography > 174-190
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2005 > Algebra and Number Theory II > 371-386
Lecture Notes in Computer Science > Smart Card Research and Applications > Session 4: Attacks and Dealing with Speci c Threats > 167-182
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2007 > Cryptanalysis II > 395-411
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Public Key Encryption > 37-51
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2010 > Security of RSA and Multivariate Schemes > 2-16
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Asymmetric Encryption > 98-115
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’96 > Asymmetric Systems > 104-113
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2004 > Algorithms and Implementation > 555-570
Communications in Computer and Information Science > Informatics Engineering and Information Science > Information Security > 141-150