Current Search:  Software protection (x)

View All Items

  • CSV Spreadsheet
(1 - 2 of 2)
Cryptography in the presence of key-dependent messages
Password-authenticated two-party key exchange with long-term security