- Low-Latency Mix Networks:
Attacks and Defenses".
Computer Security –
ESORICS 2006.
ESORICS'06. Vol. 4189. pp. 18–33. CiteSeerX 10.1.1.64.8818. doi:10.1007/11863908_2...
- classic" (PDF). 13th
European Symposium on
Research in
Computer Security (
ESORICS 2008), LNCS, Springer.
Archived from the
original (PDF) on 23 February...
- (2022). "On
Committing Authenticated-Encryption".
Computer Security –
ESORICS 2022. Vol. 13555. Cham:
Springer Nature Switzerland. doi:10.1007/978-3-031-17146-8_14...
- (September 21–23, 2009). Data
Structures with
Unpredictable Timing (PDF).
ESORICS 2009, 14th
European Symposium on
Research in
Computer Security. Saint-Malo...
- (2022). "Zero-Knowledge Age
Restriction for GNU Taler".
Computer Security –
ESORICS 2022.
Lecture Notes in
Computer Science. Vol. 13554. pp. 110–129. doi:10...
- TLS-ECDH" (PDF).
European Symposium on
Research in
Computer Security (
ESORICS'15). Montgomery,
Peter L. "Speeding the
Pollard and
elliptic curve methods...
-
Malleability and MtGox.
European Symposium on
Research in
Computer Security—
ESORICS.
Lecture Notes in
Computer Science. Vol. 8713. Springer. pp. 313–326. arXiv:1403...
-
Sequences and
Experiments with PHP and
Debian OpenSSL".
Computer Security -
ESORICS 2014.
Lecture Notes in
Computer Science. Vol. 8712. Heidelberg: Springer...
-
Claus P. Schnorr, the RSA
Award for
Excellence in
Mathematics and the
ESORICS Outstanding Research Award in 2013. On Sa****ay, 1
February 2014, Flemish...
- Foley, S.N.; Gollmann, D.; Snekkenes, E. (2017).
Computer Security â€"
ESORICS 2017: 22nd
European Symposium on
Research in
Computer Security, Oslo, Norway...