efficient secure two-party protocols
|
|
efficient secure two-party protocols
|
|
design of rijndael
|
cryptography in constant parallel time
|
|
cryptography in constant parallel time
|
guide to internet cryptography
|
|
guide to internet cryptography
|
|
practical signcryption
|
introduction to cryptography
|
|
introduction to cryptography
|
computer security and the internet
|
|
computer security and the internet
|
theory of hash functions and random ...
|
|
theory of hash functions and random oracles
|
|
lll algorithm
|
advanced statistical steganalysis
|
|
advanced statistical steganalysis
|
protocols for authentication and key...
|
|
protocols for authentication and key establishment
|
computer security and the internet
|
|
computer security and the internet
|
|
complete guide to scion
|
tutorials on the foundations of cryp...
|
|
tutorials on the foundations of cryptography
|
|
hash function blake
|
|
cryptography made simple
|
science of quantitative information flow
|
|
science of quantitative information flow
|
novel techniques in recovering, embe...
|
|
novel techniques in recovering, embedding, and enforcing policies for control-flow integrity
|
operational semantics and verificati...
|
|
operational semantics and verification of security protocols
|
modelling and verification of secure...
|
|
modelling and verification of secure exams
|