Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP)
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption
Proceedings of the 11th USENIX Security Symposium
ACM Transactions on Information and System Security (TISSEC)
Problem areas for the IP security protocols
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Hi-index | 0.00 |
When two cultures clash, an air passenger may be wished a good "fright," or one may end up regretting his karaoke performance after a sake too many. For theoreticians and practioners in information security, however, their lack of mutual understanding may lead to more serious consequences.