Search results
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2007 > Efficient Algorithms for Embedded Processors > 135-147
Lecture Notes in Computer Science > Web Services > Web Services Security and Knowledge Management > 61-71
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Cryptography > 278-286
Lecture Notes in Computer Science > Digital Rights Management. Technologies, Issues, Challenges and Systems > Supporting Cryptographic Technology > 277-297
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC’99 > Cryptographic Theory and Computation Complexity > 60-75
Lecture Notes in Computer Science > Information and Communications Security > Key Management > 315-322
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems – CHES 2005 > Arithmetic for Cryptography > 211-225
Lecture Notes in Computer Science > Advances in Information and Computer Security > Mathematical and Symmetric Cryptography > 161-177
Lecture Notes in Computer Science > Selected Areas in Cryptography > Design and Implementation of Secret Key Cryptosystems > 280-295
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 86 > Software Systems > 327-346
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2002 > Public-Key Protocols > 215-233
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2004 > Side Channels II > 220-229
Lecture Notes in Computer Science > Algorithms and Computation > 9B Computational Complexity and Cryptography > 645-654
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Security Issues on Grid/Distributed Computing Systems (SIGDCS 2006) > 303-311
Lecture Notes in Computer Science > Web Engineering > Security > 352-362