- Low-Latency Mix Networks:
Attacks and Defenses".
Computer Security –
ESORICS 2006.
ESORICS'06. Vol. 4189. pp. 18–33. CiteSeerX 10.1.1.64.8818. doi:10.1007/11863908_2...
-
Claus P. Schnorr, the RSA
Award for
Excellence in
Mathematics and the
ESORICS Outstanding Research Award in 2013. On Sa****ay, 1
February 2014, Flemish...
-
Strikes again:
Breaking PKCS#1 v1.5 in XML Encryption",
Computer Security –
ESORICS 2012,
Springer Berlin Heidelberg, pp. 752–769, CiteSeerX 10.1.1.696.5641...
- Mathi****en, On the Role of Key
Schedules in
Attacks on
Iterated Ciphers,
ESORICS 2004, pp322–334. Uri
Blumenthal and
Steven M. Bellovin, A
Better Key Schedule...
- (2022). "On
Committing Authenticated-Encryption".
Computer Security –
ESORICS 2022. Vol. 13555. Cham:
Springer Nature Switzerland. doi:10.1007/978-3-031-17146-8_14...
- classic" (PDF). 13th
European Symposium on
Research in
Computer Security (
ESORICS 2008), LNCS, Springer.
Archived from the
original (PDF) on 23 February...
-
Malleability and MtGox.
European Symposium on
Research in
Computer Security—
ESORICS.
Lecture Notes in
Computer Science. Vol. 8713. Springer. pp. 313–326. arXiv:1403...
-
Consideration of the
Modes of
Operation for
Secure Systems".
Computer Security –
ESORICS 94. Brighton: Springer-Verlag. p. 335. ISBN 978-3-540-58618-0. "DERA"....
- TLS-ECDH" (PDF).
European Symposium on
Research in
Computer Security (
ESORICS'15). Montgomery,
Peter L. "Speeding the
Pollard and
elliptic curve methods...
-
Sequences and
Experiments with PHP and
Debian OpenSSL".
Computer Security -
ESORICS 2014.
Lecture Notes in
Computer Science. Vol. 8712. Heidelberg: Springer...