3. AFRICACRYPT 2010: Stellenbosch, South Africa

Signatures

Attacks

Protocols

Networks

Elliptic Curves

Side-Channel Attacks and Fault Attacks

Public-Key Encryption

Keys and PUFs

Ciphers and Hash Functions

a service of Schloss Dagstuhl - Leibniz Center for Informatics