Search results
Lecture Notes in Computer Science > Information Hiding > Attacks on Watermarking Algorithms > 213-225
Lecture Notes in Computer Science > Advances in Cryptology — CRYPT0’ 95 > Cryptanalysis II > 262-273
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > Provable Security: Key Agreement > 104-117
Lecture Notes in Computer Science > Information Security and Privacy > Symmetric Key Cryptography > 16-33
Lecture Notes in Computer Science > Information and Communications Security > Digital Signatures I > 53-60
Lecture Notes in Computer Science > Information Security and Cryptology > Signature and Signcryption > 75-92
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems > Cryptanalytic Hardware > 2-12
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2001 > Symmetric Ciphers > 395-405
Lecture Notes in Computer Science > Progress in Cryptology – INDOCRYPT 2011 > Hash Functions > 255-269
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT’98 > Finite Automata > 227-241
Lecture Notes in Computer Science > Information Security > Attacks on Public Key Algorithms > 234-239
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’85 Proceedings > Single Key Cryptology > 212-226
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Physical Security and Cryptanalysis > 318-327
Lecture Notes in Computer Science > Secure Mobile Ad-hoc Networks and Sensors > Mobile Ad-Hoc Networks and Sensors > 144-157