Intractable problems in number theory (invited talk)
CRYPTO '88 Proceedings on Advances in cryptology
On the importance of securing your bins: the garbage-man-in-the-middle attack
Proceedings of the 4th ACM conference on Computer and communications security
On the Security of RSA Padding
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Toward an automated verification of certificates of authenticity
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Index Calculation Attacks on RSA Signature and Encryption
Designs, Codes and Cryptography
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
New attacks on PKCS#1 v1.5 encryption
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On the broadcast and validity-checking security of PKCS#1 v1.5 encryption
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
On the joint security of encryption and signature in EMV
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Randomization enhanced Chaum's blind signature scheme
Computer Communications
Securing cloud-based computations against malicious providers
ACM SIGOPS Operating Systems Review
Detailed cost estimation of CNTW attack against EMV signature scheme
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Securing cloud-based computations against malicious providers
Proceedings of the 1st European Workshop on Dependable Cloud Computing
Hi-index | 0.00 |