Author of the publication

Efficient an Implementation Method Research of a Smart Card Atomic Operation.

, , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 113-121. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Transferable Cash with Group Signatures., , and . ISC, volume 2200 of Lecture Notes in Computer Science, page 462-474. Springer, (2001)A New Aspect of Dual Basis for Efficient Field Arithmetic., and . Public Key Cryptography, volume 1560 of Lecture Notes in Computer Science, page 12-28. Springer, (1999)Automated vulnerability analysis technique for smart grid infrastructure., , , , and . ISGT, page 1-5. IEEE, (2017)Efficient an Implementation Method Research of a Smart Card Atomic Operation., , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 113-121. Springer, (2007)Digital Signature Schemes with Restriction on Signing Capability., , , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 324-335. Springer, (2003)On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis., , , and . ICISC, volume 1787 of Lecture Notes in Computer Science, page 38-52. Springer, (1999)Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation., , , , and . ICISC, volume 2288 of Lecture Notes in Computer Science, page 103-113. Springer, (2001)EC2C-PAKA: An efficient client-to-client password-authenticated key agreement., , and . Inf. Sci., 177 (19): 3995-4013 (2007)The All-Purpose Sword: North Korea's Cyber Operations and Strategies., , and . CyCon, page 1-20. IEEE, (2019)Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis., , , , and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 274-288. Springer, (2000)