Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer (2nd ed.)
ESA/390 integrated cryptographic facility: an overview
IBM Systems Journal - Special issue on cryptology
Common cryptographic architecture cryptographic application programming interface
IBM Systems Journal - Special issue on cryptology
A key-management scheme based on control vectors
IBM Systems Journal - Special issue on cryptology
Transaction security system extensions to the common cryptographic architecture
IBM Systems Journal - Special issue on cryptology
IBM Systems Journal - Special issue on cryptology
ESA/390 integrated cryptographic facility: an overview
IBM Systems Journal - Special issue on cryptology
Common cryptographic architecture cryptographic application programming interface
IBM Systems Journal - Special issue on cryptology
A key-management scheme based on control vectors
IBM Systems Journal - Special issue on cryptology
Transaction security system extensions to the common cryptographic architecture
IBM Systems Journal - Special issue on cryptology
Attacks on Cryptoprocessor Transaction Sets
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Technical note: complementarity attacks and control vectors
IBM Systems Journal
A public key extension to the common Cryptographic Architecture
IBM Systems Journal
A provable-security treatment of the key-wrap problem
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |