IEEE-Computer Science and its Applications (CSA 2009), page. 1 - 4, 2009-12-10
WISA 2009, page. 339 - 353, 2009-08-26
CT-RSA 2009, page. 325 - 339, 2009-04-23
Springer-Verlag, page. 344 - 358, 2005-09-01
Springer-Verlag, page. 291 - 304, 2004-10-01
9th Australasian Conference on Information Security and Privacy (ACISP 2004), page. 200 - 211, 2004-07-01
Springer-Verlag, page. 36 - 49, 2004-07-01
Springer-Verlag, page. 71 - 84, 2004-06-01
Springer-Verlag, page. 322 - 334, 2004-06-01
International Conference on Computational Science and Its Applications 2004, page. 802 - 811, 2004-05-01
Springer-Verlag, page. 442 - 450, 2004-05-01
Springer-Verlag, page. 359 - 373, 2003-12-01
Springer-Verlag, page. 167 - 182, 2003-12-01
Springer-Verlag, page. 167 - 182, 2003-12-01
IEICE, Transactions on communications, page. 2362 - 2368, 2002-06-01
The 4th International Conference on Information Security and Cryptology, LNCS, page. 341 - 354, 2001-12-01
LNCS, Public Key Cryptography, page. 325 - 338, 2001-02-01
LNCS, Workshop on Cryptographic Hardware and Embedded Systems 2000 - CHES2000, page. 57 - 70, 2000-08-01