Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AES-CCM Cipher Suites for Transport Layer Security (TLS)., and . RFC, (July 2012)Breaking ECC2K-130., , , , , , , , , and 13 other author(s). IACR Cryptology ePrint Archive, (2009)One-touch Financial Transaction Authentication., , , and . SECRYPT, page 5-12. INSTICC Press, (2009)Statistics on Password Re-use and Adaptive Strength for Financial Accounts., , and . SCN, volume 8642 of Lecture Notes in Computer Science, page 218-235. Springer, (2014)Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms., and . CRYPTO, volume 1462 of Lecture Notes in Computer Science, page 472-485. Springer, (1998)Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware., , , , , and . FPL, page 133-138. IEEE Computer Society, (2010)The Certicom Challenges ECC2-X., , , , , , , , , and 8 other author(s). IACR Cryptology ePrint Archive, (2009)Shoehorning Security into the EPC Tag Standard., and . SCN, volume 4116 of Lecture Notes in Computer Science, page 303-320. Springer, (2006)Covert channels in privacy-preserving identification systems., , , and . ACM Conference on Computer and Communications Security, page 297-306. ACM, (2007)Vulnerabilities in First-Generation RFID-enabled Credit Cards., , , , and . Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, page 2-14. Springer, (2007)