Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-6
|
Results: 6
Cryptography on smart cards
Authors:
Borst, J Preneel, B Rijmen, V
Citation:
J. Borst et al., Cryptography on smart cards, COMPUT NET, 36(4), 2001, pp. 423-435
Variation of Cramer-Shoup public key scheme
Authors:
Borst, J Preneel, B Vandewalle, J
Citation:
J. Borst et al., Variation of Cramer-Shoup public key scheme, ELECTR LETT, 36(1), 2000, pp. 32-32
CNN algorithms for video authentication and copyright protection
Authors:
Csapodi, M Vandewalle, J Preneel, B
Citation:
M. Csapodi et al., CNN algorithms for video authentication and copyright protection, J VLSI S P, 23(2-3), 1999, pp. 449-463
The state of cryptographic hash functions
Authors:
Preneel, B
Citation:
B. Preneel, The state of cryptographic hash functions, LECT N COMP, 1561, 1999, pp. 158-182
State-of-the-art ciphers for commercial applications
Authors:
Preneel, B
Citation:
B. Preneel, State-of-the-art ciphers for commercial applications, COMPUT SEC, 18(1), 1999, pp. 67-74
On the security of iterated message authentication codes
Authors:
Preneel, B van Oorschot, PC
Citation:
B. Preneel et Pc. Van Oorschot, On the security of iterated message authentication codes, IEEE INFO T, 45(1), 1999, pp. 188-199
Risultati:
1-6
|