- Low-Latency Mix Networks:
Attacks and Defenses".
Computer Security –
ESORICS 2006.
ESORICS'06. Vol. 4189. pp. 18–33. CiteSeerX 10.1.1.64.8818. doi:10.1007/11863908_2...
- Mathi****en, On the Role of Key
Schedules in
Attacks on
Iterated Ciphers,
ESORICS 2004, pp322–334. Uri
Blumenthal and
Steven M. Bellovin, A
Better Key Schedule...
-
Strikes again:
Breaking PKCS#1 v1.5 in XML Encryption",
Computer Security –
ESORICS 2012,
Springer Berlin Heidelberg, pp. 752–769, CiteSeerX 10.1.1.696.5641...
-
Sequences and
Experiments with PHP and
Debian OpenSSL".
Computer Security -
ESORICS 2014.
Lecture Notes in
Computer Science. Vol. 8712. Heidelberg: Springer...
- (2022). "On
Committing Authenticated-Encryption".
Computer Security –
ESORICS 2022. Vol. 13555. Cham:
Springer Nature Switzerland. doi:10.1007/978-3-031-17146-8_14...
-
Version IV:
Inductive analysis of the
secrecy goals".
Computer Security —
ESORICS 98.
Lecture Notes in
Computer Science. Vol. 1485. pp. 361–375. doi:10.1007/BFb0055875...
- (September 21–23, 2009). Data
Structures with
Unpredictable Timing (PDF).
ESORICS 2009, 14th
European Symposium on
Research in
Computer Security. Saint-Malo...
-
Claus P. Schnorr, the RSA
Award for
Excellence in
Mathematics and the
ESORICS Outstanding Research Award in 2013. On Sa****ay, 1
February 2014, Flemish...
-
Consideration of the
Modes of
Operation for
Secure Systems".
Computer Security –
ESORICS 94. Brighton: Springer-Verlag. p. 335. ISBN 978-3-540-58618-0. "DERA"....
- classic" (PDF). 13th
European Symposium on
Research in
Computer Security (
ESORICS 2008), LNCS, Springer.
Archived from the
original (PDF) on 23 February...