Inproceedings,

Secure Applications of Low-Entropy Keys.

, , , and .
ISW, volume 1396 of Lecture Notes in Computer Science, page 121-134. Springer, (1997)

Meta data

Tags

Users

  • @dblp

Comments and Reviews