Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low Cost Watermarking Based on a Human Vision Model., , , , and . ECMAST, volume 1242 of Lecture Notes in Computer Science, page 153-167. Springer, (1997)A New Parallelism Management Scheme for Multiprocessor Systems., , , and . ACPC, volume 1557 of Lecture Notes in Computer Science, page 246-256. Springer, (1999)Electromagnetic Attack., and . Encyclopedia of Cryptography and Security, Springer, (2005)Analytical Characteristics of the DES., , , , , , , , , and . CRYPTO, page 171-202. Plenum Press, New York, (1983)Electromagnetic Attack., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications., , , , and . CARDIS, (1996)Authentication protocols for ad hoc networks: taxonomy and research issues., , , , and . Q2SWinet, page 96-104. ACM, (2005)New identity based signcryption schemes from pairings., and . IACR Cryptology ePrint Archive, (2003)The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys)., , and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 537-542. Springer, (1985)Fast Server-Aided RSA Signatures Secure Against Active Attacks., and . CRYPTO, volume 963 of Lecture Notes in Computer Science, page 57-69. Springer, (1995)