AAAAAA

   
Results: 1-5 |
Results: 5

Authors: Guillou, LC Ugon, M Quisquater, JJ
Citation: Lc. Guillou et al., Cryptographic authentication protocols for smart cards, COMPUT NET, 36(4), 2001, pp. 437-451

Authors: Joye, M Quisquater, JJ Takagi, T
Citation: M. Joye et al., How to choose secret parameters for RSA-type cryptosystems over elliptic curves, DES CODES C, 23(3), 2001, pp. 297-316

Authors: Joye, M Lenstra, AK Quisquater, JJ
Citation: M. Joye et al., Chinese remaindering based cryptosystems in the presence of faults, J CRYPTOL, 12(4), 1999, pp. 241-245

Authors: Gilmont, T Legat, JD Quisquater, JJ
Citation: T. Gilmont et al., Hardware security for software privacy support, ELECTR LETT, 35(24), 1999, pp. 2096-2098

Authors: Gilbert, H Gupta, D Odlyzko, A Quisquater, JJ
Citation: H. Gilbert et al., Attacks on Shamir's 'RSA for paranoids', INF PROCESS, 68(4), 1998, pp. 197-199
Risultati: 1-5 |