AAAAAA

   
Results: 1-6 |
Results: 6

Authors: Borst, J Preneel, B Rijmen, V
Citation: J. Borst et al., Cryptography on smart cards, COMPUT NET, 36(4), 2001, pp. 423-435

Authors: Borst, J Preneel, B Vandewalle, J
Citation: J. Borst et al., Variation of Cramer-Shoup public key scheme, ELECTR LETT, 36(1), 2000, pp. 32-32

Authors: Csapodi, M Vandewalle, J Preneel, B
Citation: M. Csapodi et al., CNN algorithms for video authentication and copyright protection, J VLSI S P, 23(2-3), 1999, pp. 449-463

Authors: Preneel, B
Citation: B. Preneel, The state of cryptographic hash functions, LECT N COMP, 1561, 1999, pp. 158-182

Authors: Preneel, B
Citation: B. Preneel, State-of-the-art ciphers for commercial applications, COMPUT SEC, 18(1), 1999, pp. 67-74

Authors: Preneel, B van Oorschot, PC
Citation: B. Preneel et Pc. Van Oorschot, On the security of iterated message authentication codes, IEEE INFO T, 45(1), 1999, pp. 188-199
Risultati: 1-6 |