Filter your results
- 3
- 3
- 3
- 2
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
A More Efficient 1–Checkable Secure Outsourcing Algorithm for Bilinear Maps11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.155-164, ⟨10.1007/978-3-319-93524-9_10⟩
Conference papers
hal-01875517v1
|
||
|
Impossible Differential Cryptanalysis of Reduced-Round LBlock6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.179-188, ⟨10.1007/978-3-642-30955-7_16⟩
Conference papers
hal-01534301v1
|
||
|
Examination of a New Defense Mechanism: Honeywords11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.130-139, ⟨10.1007/978-3-319-93524-9_8⟩
Conference papers
hal-01875522v1
|