Hardware-intrinsic security is a young field dealing with secure secret key storage. By generatin...
Encryption Schemes.- New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive.- Op...
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop o...
You are holding the rst in a hopefully long and successful series of RSA Cr- tographers¿ Track pr...
This book constitutes the refereed proceedingsof the 14th International Conference on Cryptology ...
In recent years applied cryptography has developed considerably to satisfy the - creasing securit...
History.- Mary of Guise's enciphered letters.- About Professionalisation in the Intelligence Comm...
This book constitutes the thoroughly refereedpost-conference proceedings of the 8th International...
This book constitutes the refereed proceedings of the 20th International Conference on Informatio...
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generatin...