Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Lyubashevsky, Vadim
2005.
Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques.
Vol. 3624,
Issue. ,
p.
378.
Kevenaar, T.
Schrijen, G. J.
Akkermans, A.
Damstra, M.
Tuyls, P.
and
van der Veen, M.
2006.
ISSE 2006 — Securing Electronic Busines Processes.
p.
196.
Fouque, Pierre-Alain
Pointcheval, David
Stern, Jacques
and
Zimmer, Sébastien
2006.
Automata, Languages and Programming.
Vol. 4052,
Issue. ,
p.
240.
Zhou, Wenqin
Carette, J.
Jeffrey, D. J.
and
Monagan, M. B.
2006.
Artificial Intelligence and Symbolic Computation.
Vol. 4120,
Issue. ,
p.
254.
Atti, Nadia Ben
Diaz–Toca, Gema M.
and
Lombardi, Henri
2006.
The Berlekamp-Massey Algorithm revisited.
Applicable Algebra in Engineering, Communication and Computing,
Vol. 17,
Issue. 1,
p.
75.
Agarwal, Saurabh
and
Frandsen, Gudmund Skovbjerg
2006.
LATIN 2006: Theoretical Informatics.
Vol. 3887,
Issue. ,
p.
30.
Chevassut, Olivier
Fouque, Pierre-Alain
Gaudry, Pierrick
and
Pointcheval, David
2006.
Public Key Cryptography - PKC 2006.
Vol. 3958,
Issue. ,
p.
410.
Park, Sangjoon
Nam, Junghyun
Kim, Seungjoo
and
Won, Dongho
2006.
Topics in Cryptology – CT-RSA 2007.
Vol. 4377,
Issue. ,
p.
309.
Brown, Jaimee
Nieto, Juan Manuel González
and
Boyd, Colin
2006.
Progress in Cryptology - INDOCRYPT 2006.
Vol. 4329,
Issue. ,
p.
176.
Chai, ZhenChuan
Cao, ZhenFu
and
Dong, XiaoLei
2007.
Identity-based signature scheme based on quadratic residues.
Science in China Series F: Information Sciences,
Vol. 50,
Issue. 3,
p.
373.
Liu, Dennis Y. W.
Chang, Shuang
Wong, Duncan S.
and
Mu, Yi
2007.
Advances in Information and Computer Security.
Vol. 4752,
Issue. ,
p.
396.
Tuyls, Pim
and
Kevenaar, Tom
2007.
Security, Privacy, and Trust in Modern Data Management.
p.
417.
Ivanyos, Gábor
Sanselme, Luc
and
Santha, Miklos
2007.
STACS 2007.
Vol. 4393,
Issue. ,
p.
586.
Arakala, Arathi
Jeffers, Jason
and
Horadam, K. J.
2007.
Advances in Biometrics.
Vol. 4642,
Issue. ,
p.
760.
Al-Taee, Majid A.
Al-Naima, Fawzi M.
and
Al-Jewad, Bessam
2007.
Symbolic-Numeric Computation.
p.
375.
Dodis, Yevgeniy
and
Pietrzak, Krzysztof
2007.
Fast Software Encryption.
Vol. 4593,
Issue. ,
p.
414.
Cheon, Jung Hee
Hong, Jin
and
Kim, Minkyu
2008.
Advances in Cryptology - ASIACRYPT 2008.
Vol. 5350,
Issue. ,
p.
471.
Birkett, James
and
Dent, Alexander W.
2008.
Public Key Cryptography – PKC 2008.
Vol. 4939,
Issue. ,
p.
47.
Hirano, Takato
Wada, Koichiro
and
Tanaka, Keisuke
2008.
Information Security and Privacy.
Vol. 5107,
Issue. ,
p.
98.
May, Alexander
and
Ritzenhofen, Maike
2008.
Public Key Cryptography – PKC 2008.
Vol. 4939,
Issue. ,
p.
37.