Key handling with control vectors
IBM Systems Journal - Special issue on cryptology
A key-management scheme based on control vectors
IBM Systems Journal - Special issue on cryptology
IBM Systems Journal - Special issue on cryptology
ESA/390 integrated cryptographic facility: an overview
IBM Systems Journal - Special issue on cryptology
Key handling with control vectors
IBM Systems Journal - Special issue on cryptology
Transaction security system extensions to the common cryptographic architecture
IBM Systems Journal - Special issue on cryptology
Design of the commercial data masking facility data privacy algorithm
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
The Commercial Data Masking Facility (CDMF) data privacy algorithm
IBM Journal of Research and Development
Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption
Proceedings of the 11th USENIX Security Symposium
A public key extension to the common Cryptographic Architecture
IBM Systems Journal
Automatic discovery of API-level exploits
Proceedings of the 27th international conference on Software engineering
What we can learn from API security
Proceedings of the 11th international conference on Security Protocols
Hi-index | 0.00 |